A novel fuzzy trust-based secure routing scheme in flying ad hoc networks

M Hosseinzadeh, AH Mohammed, FA Alenizi… - Vehicular …, 2023 - Elsevier
Today, many studies assess vulnerabilities, threats, and attacks in flying ad hoc networks
(FANETs) to provide solutions for countermeasures. Protecting FANETs against attackers …

Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT

N Kumar, R Ali - Computer Networks, 2024 - Elsevier
Abstract In recent years, Maritime Transportation Systems (MTS) have experienced
significant advancements through the adoption of Internet of Things (IoT) technology. The …

BPADTA: Blockchain-based privacy-preserving authentication scheme for digital twin empowered aerospace industry

P Aggarwal, B Narwal, S Purohit… - Computers and Electrical …, 2023 - Elsevier
Ensuring privacy and security in the aerospace industry's digital twin (DT) applications is of
utmost importance, particularly when sensitive data collected by aerospace assets is shared …

Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments

S Ju, Y Park - Sensors, 2023 - mdpi.com
A paradigm that combines cloud computing and the Internet of Things (IoT) allows for more
impressive services to be provided to users while addressing storage and computational …

[HTML][HTML] A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring

M Hosseinzadeh, S Ali, AM Rahmani, J Lansky… - Journal of King Saud …, 2024 - Elsevier
Nowadays, the use of drones as a fundamental element of smart cities has attracted the
attention of many researchers to monitor and control the traffic of vehicles. Because of the …

A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions

O Ceviz, P Sadioglu, S Sen - arXiv preprint arXiv:2306.14281, 2023 - arxiv.org
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …

Iomt-badt: a blockchain-envisioned secure architecture with a lightweight authentication scheme for the digital twin environment in the internet of medical things

A Jain, M Garg, A Gupta, S Batra, B Narwal - The Journal of …, 2024 - Springer
A healthcare-focused version of the Internet of Things (IoT), the Internet of Medical Things
(IoMT) enables real-time monitoring and remote medical support via integrated medical …

A Featherweight Authentication and Key Agreement Scheme for Internet of Drones Applications

C Pu - 2023 IEEE 34th Annual International Symposium on …, 2023 - ieeexplore.ieee.org
The Internet of Drones (IoD) will have revolutionized civil and commercial applications, in
much the similar way that the Internet of Things (IoT) transformed the way information is …

Blockchain-Empowered Immutable and Reliable Delivery Service (BIRDS) Using UAV Networks

S Hafeez, HU Manzoor, L Mohjazi… - 2023 IEEE 28th …, 2023 - ieeexplore.ieee.org
Exploiting unmanned aerial vehicles (UAVs) for delivery services is expected to reduce
delivery time and human resource costs. However, the proximity of these UAVs to the …

Deeper insight into why authentication schemes in IoT environments fail to achieve the desired security

Y Guo, Y Guo, P Xiong, F Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Designing an efficient and secure authentication scheme is a significant means to ensure
the security of IoT systems. Hundreds of authentication schemes tailored for IoT …