作者
Haqi Khalid, Shaiful Jahari Hashim, Fazirulhisyam Hashim, Sharifah Mumtazah Syed Ahamed, Muhammad Akmal Chaudhary, Hamza HM Altarturi, Muntadher Saadoon
发表日期
2023/3/27
期刊
IEEE Transactions on Vehicular Technology
卷号
72
期号
8
页码范围
10906-10920
出版商
IEEE
简介
The unmanned aerial vehicles (UAVs) in military and civilian systems access sensitive data via cellular networks and are ubiquitous. Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to the wireless connectivity. For example, a UAV initially served by cell A may be handed over to cell B after a certain point. Therefore, Security and privacy concerns raise if there is a change in the flight path of the UAV due to wide-area connectivity traffic management, including authentication threats as well as the leakage of identity, location, and flying routes. Also, drones are resource-constrained devices that cannot perform extensive operations, leading to the inability to resist drone capture attacks and impersonation attacks. Therefore, this paper presents a high-performance and efficient anonymous handover …
引用总数
学术搜索中的文章