[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yu et al., 2023 - Google Patents

LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks

Yu et al., 2023

Document ID
7323758061318165190
Author
Yu S
Lee J
Sutrala A
Das A
Park Y
Publication year
Publication venue
Computer networks

External Links

Snippet

Abstract Unmanned Aerial Vehicle (UAV) can be employed in various applications, including traffic control, and delivery application. However, these services are susceptible to various security attacks because sensitive data are exchanged through an open channel …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Similar Documents

Publication Publication Date Title
Bera et al. Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
Wazid et al. Design of secure key management and user authentication scheme for fog computing services
Nikooghadam et al. A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance
Pu et al. A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment
Zhang et al. SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks
Eddine et al. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
Chaudhry et al. GCACS-IoD: A certificate based generic access control scheme for Internet of drones
Chaudhry et al. Rotating behind privacy: An improved lightweight authentication scheme for cloud-based IoT environment
Yu et al. LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks
Thakur et al. An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment
Zhang et al. An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
Das et al. A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems
Wazid et al. BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system
Zahoor et al. An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
Li et al. Blockchain-based mutual authentication protocol without CA
Yu et al. ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor
Abdussami et al. LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment
Jabbari et al. Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
Xia et al. A secure and efficient authenticated key exchange scheme for smart grid
Zheng et al. Design and analysis of a security-enhanced three-party authenticated key agreement protocol based on chaotic maps
Sharma et al. A blockchain based secure communication framework for community interaction
Irshad et al. A low-cost privacy preserving user access in mobile edge computing framework
Zhang et al. PRLAP-IoD: A PUF-based robust and lightweight authentication protocol for Internet of Drones
Bagga et al. Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
Itoo et al. RKMIS: robust key management protocol for industrial sensor network system