A UAV-assisted UE access authentication scheme for 5G/6G network

R Ma, J Cao, S He, Y Zhang, B Niu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unmanned Aircraft Vehicles (UAVs) equipped with base stations can assist ground User
Equipments (UEs) in accessing the 5G/6G network. Due to the UAV's high autonomy, easy …

A novel access and handover authentication scheme in UAV-aided satellite-terrestrial integration networks enabling 5G

X Ren, J Cao, R Ma, Y Luo, J Guan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As an outlook of the terrestrial network, the flexible Unmanned Aerial Vehicle (UAV)-aided
satellite-terrestrial integration network would have numerous prospective applications such …

A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

: A Lightweight, Trustworthy Authentication Scheme for UAV-Assisted IoT Applications

M Adil, H Abulkasim, A Farouk… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The technology of Unmanned Aerial Vehicles (UAVs) has sparked a revolution in numerous
Internet of Things (IoT) applications, such as flood monitoring, wildfire monitoring, coastal …

A lightweight authentication protocol for UAV networks based on security and computational resource optimization

Y Lei, L Zeng, YX Li, MX Wang, H Qin - IEEE Access, 2021 - ieeexplore.ieee.org
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and
computing resource application efficiency of UAV a hot topic in the security field of the …

Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks

A Braeken, M Liyanage, P Kumar, J Murphy - Ieee Access, 2019 - ieeexplore.ieee.org
The security of mobile communication largely depends on the strength of the authentication
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …

Standardization trends for operation of unmanned aerial vehicles based on 5G

H Lee, JS Bae, SJ Bahng, HS Lee - Electronics and …, 2021 - koreascience.kr
Among the activities of 3GPP for operating 5G-based unmanned aerial vehicles, we
introduce several use cases of UAVs in 5G mobile communication such as radio access …

Zero-Trust UAV-enabled and DT-supported 6G Networks

I Al Ridhawi, M Aloqaily - GLOBECOM 2023-2023 IEEE Global …, 2023 - ieeexplore.ieee.org
The Sixth Generation (6G) network is a cooperative network that relies on the capabilities of
edge and end-devices. Unmanned Aerial Vehicles (UAV) will play a significant role in this …

Enabling space-air integration ': A satellite-UAV networking authentication scheme

S Li, J Cao, X Shi, H Li - Secur Saf, 2024 - sands.edpsciences.org
One of the goals of the sixth generation mobile networks (6G) is to achieve a larger network
coverage area. Satellite networks enable global coverage, and aerial nodes such as …

Towards a secure and computational framework for internet of drones enabled aerial computing

M Tanveer, TN Nguyen, M Ahmad… - … on Network Science …, 2022 - ieeexplore.ieee.org
In Internet of Drones (IoD), unmanned aerial vehicles (UAVs) or drones are deployed in
various mission-critical applications to collect sensitive data and disseminate it to the server …