Yu et al., 2023 - Google Patents
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networksYu et al., 2023
- Document ID
- 7323758061318165190
- Author
- Yu S
- Lee J
- Sutrala A
- Das A
- Park Y
- Publication year
- Publication venue
- Computer networks
External Links
Snippet
Abstract Unmanned Aerial Vehicle (UAV) can be employed in various applications, including traffic control, and delivery application. However, these services are susceptible to various security attacks because sensitive data are exchanged through an open channel …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bera et al. | Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment | |
Wazid et al. | Design of secure key management and user authentication scheme for fog computing services | |
Nikooghadam et al. | A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance | |
Pu et al. | A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment | |
Zhang et al. | SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks | |
Eddine et al. | EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles | |
Chaudhry et al. | GCACS-IoD: A certificate based generic access control scheme for Internet of drones | |
Chaudhry et al. | Rotating behind privacy: An improved lightweight authentication scheme for cloud-based IoT environment | |
Yu et al. | LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks | |
Thakur et al. | An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment | |
Zhang et al. | An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones | |
Das et al. | A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems | |
Wazid et al. | BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system | |
Zahoor et al. | An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF | |
Li et al. | Blockchain-based mutual authentication protocol without CA | |
Yu et al. | ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor | |
Abdussami et al. | LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment | |
Jabbari et al. | Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table | |
Xia et al. | A secure and efficient authenticated key exchange scheme for smart grid | |
Zheng et al. | Design and analysis of a security-enhanced three-party authenticated key agreement protocol based on chaotic maps | |
Sharma et al. | A blockchain based secure communication framework for community interaction | |
Irshad et al. | A low-cost privacy preserving user access in mobile edge computing framework | |
Zhang et al. | PRLAP-IoD: A PUF-based robust and lightweight authentication protocol for Internet of Drones | |
Bagga et al. | Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system | |
Itoo et al. | RKMIS: robust key management protocol for industrial sensor network system |