A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance
Authors
Keywords
Authentication, Internet-of-Drones, Key agreement, Security, Scyther
Journal
JOURNAL OF SYSTEMS ARCHITECTURE
Volume -, Issue -, Pages 101955
Publisher
Elsevier BV
Online
2020-12-02
DOI
10.1016/j.sysarc.2020.101955
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A lightweight authentication and key agreement scheme for internet of drones
- (2020) Yunru Zhang et al. COMPUTER COMMUNICATIONS
- Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
- (2020) Basudeb Bera et al. COMPUTER COMMUNICATIONS
- White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
- (2020) Yudi ZHANG et al. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
- Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme
- (2020) Qi Feng et al. IET Information Security
- A lightweight authentication scheme with privacy protection for smart grid communications
- (2019) Liping Zhang et al. Future Generation Computer Systems-The International Journal of eScience
- TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
- (2019) Jangirala Srinivas et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- An efficient lightweight authentication scheme for human-centered industrial Internet of Things
- (2019) Jaya Singh et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
- (2019) Mahdi Nikooghadam et al. JOURNAL OF SUPERCOMPUTING
- Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
- (2019) Shubhani Aggarwal et al. COMPUTER COMMUNICATIONS
- Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
- (2019) Saurav Malani et al. IEEE Internet of Things Journal
- Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
- (2018) Debiao He et al. IEEE Transactions on Dependable and Secure Computing
- Secure Key Agreement and Key Protection for Mobile Device User Authentication
- (2018) Libing Wu et al. IEEE Transactions on Information Forensics and Security
- Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
- (2018) Ming Luo et al. Security and Communication Networks
- Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption
- (2018) Jung Hee Cheon et al. IEEE Access
- Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
- (2018) Mohammad Wazid et al. IEEE Internet of Things Journal
- Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
- (2018) Yoney Kirsal Ever IEEE Systems Journal
- Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme
- (2018) Niloofar Ravanbakhsh et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs
- (2018) Marko Kompara et al. Computer Networks
- Privacy Protection for Internet of Drones: A Network Coding Approach
- (2018) Yu-Jia Chen et al. IEEE Internet of Things Journal
- Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles
- (2017) Vishal Sharma et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications
- (2017) Jongho Won et al. IEEE Access
- Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks
- (2017) Fadi Al-Turjman et al. IEEE Access
- Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
- (2017) Sravani Challa et al. IEEE Access
- Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
- (2017) Qi Jiang et al. IEEE Access
- Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
- (2017) Saru Kumari et al. Journal of Ambient Intelligence and Humanized Computing
- Chaotic Map-based Anonymous User Authentication Scheme with User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
- (2017) Sandip Roy et al. IEEE Internet of Things Journal
- An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
- (2016) Mohammad Sabzinejad Farash et al. Ad Hoc Networks
- Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
- (2016) Ruhul Amin et al. Computer Networks
- Internet of Drones
- (2016) Mirmojtaba Gharibi et al. IEEE Access
- Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives
- (2016) Naser Hossein Motlagh et al. IEEE Internet of Things Journal
- Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care
- (2015) Lili Xu et al. JOURNAL OF MEDICAL SYSTEMS
- A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
- (2014) Muhamed Turkanović et al. Ad Hoc Networks
- Design and analysis of an improved smartcard-based remote user password authentication scheme
- (2014) SK Hafizul Islam INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now