Authenticating drone-assisted internet of vehicles using elliptic curve cryptography and blockchain
MA El-Zawawy, A Brighente… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The inclusion of drones in Internet of Vehicles (IoV) is a current trend that presents
significant trade-offs. On the one hand, Unmanned Aerial Vehicles (UAVs) provide …
significant trade-offs. On the one hand, Unmanned Aerial Vehicles (UAVs) provide …
Blockchain-based privacy-preserving authentication protocol for UAV networks
Unmanned aerial vehicles (UAVs) are getting common in the market nowadays and being
used in numerous real-time applications because they are lightweight, cost-effective, easy to …
used in numerous real-time applications because they are lightweight, cost-effective, easy to …
UAV‐IoT collaboration: energy and time‐saving task scheduling scheme
UAVs are capable of providing significant potential to IoT devices through sensors, cameras,
GPS systems, and so forth. Therefore, the smart UAV‐IoT collaborative system has become …
GPS systems, and so forth. Therefore, the smart UAV‐IoT collaborative system has become …
Quantum-safe secure and authorized communication protocol for internet of drones
Remotely-Controlled Aerial Vehicles (RCAV), popularly known as drones, have gained wide
popularity in several applications from military to civilian due to the usage of sensors …
popularity in several applications from military to civilian due to the usage of sensors …
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things
E Ebrahimpour, S Babaie - Peer-to-Peer Networking and Applications, 2023 - Springer
Abstract Internet of Things (IoT) is a ubiquitous network of connected physical objects with
unique identity (ID), which can be controlled through a variety of communication …
unique identity (ID), which can be controlled through a variety of communication …
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning
The proliferation of drones at a consumer level enables malicious users to equip them with
recording devices to snoop sensitive information. Drones may also be used to carry …
recording devices to snoop sensitive information. Drones may also be used to carry …
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks
Z Guo, J Cao, X Wang, Y Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G
Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of …
Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of …
VSKAP-IoD: A Verifiably Secure Key Agreement Protocol for Securing IoD Environment
AA Alzahrani - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Drones (IoD) presents a crucial framework for managing drones in a
decentralized manner, facilitating control, navigation, and access through the Internet. Given …
decentralized manner, facilitating control, navigation, and access through the Internet. Given …
Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones
C Pu - 2023 IEEE Conference on Dependable and Secure …, 2023 - ieeexplore.ieee.org
As drones are becoming an indispensable part of society, the idea of Internet of Drones
(IoD) has became a commercial reality. In the IoD framework, drones are dispatched to …
(IoD) has became a commercial reality. In the IoD framework, drones are dispatched to …
A Lightweight Aggregate Authentication Protocol for Internet of Drones
C Pu, KKR Choo - 2024 IEEE 21st Consumer Communications …, 2024 - ieeexplore.ieee.org
The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has
quickly became the driving force for various civilian applications (eg, body temperature …
quickly became the driving force for various civilian applications (eg, body temperature …