A review on communications perspective of flying ad-hoc networks: key enabling wireless technologies, applications, challenges and open research topics

F Noor, MA Khan, A Al-Zahrani, I Ullah, KA Al-Dhlan - Drones, 2020 - mdpi.com
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military
applications, are presently finding their way in many civilian and commercial applications. If …

Secure UAV-aided mobile edge computing for IoT: A review

ET Michailidis, K Maliatsos, DN Skoutas… - IEEE …, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …

A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems

MA Khan, I Ullah, A Alkhalifah… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this article, unmanned aerial vehicles (UAVs) are expected to play a key role in improving
the safety and reliability of transportation systems, particularly where data traffic is …

Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)

E Balamurugan, A Mehbodniya, E Kariri, K Yadav… - Pattern recognition …, 2022 - Elsevier
Cloud computing leads an organization for data storage, sharing, processing, and other
services. It was subjected to several challenges insecurity due to the presence of regular …

An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks

MA Khan, I Ullah, N Kumar, OS Oubbati… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single
large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the …

Security in internet of drones: A comprehensive review

S Samanth, P KV, M Balachandra - Cogent Engineering, 2022 - Taylor & Francis
Abstract Unmanned Aerial Vehicles (UAVs), also called drones, are used for various
applications with two basic classifications: civilian and military drones. Civilian drones are …

A provably secure authentication and key exchange protocol in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, CM Chen - Security and Communication …, 2021 - Wiley Online Library
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …

Securing internet of drones with identity-based proxy signcryption

MA Khan, H Shah, SU Rehman, N Kumar… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is a decentralized networking architecture that makes use of the
internet for uniting drones to enter controlled airspace in a coordinated manner. On the one …

A pairing-free heterogeneous signcryption scheme for unmanned aerial vehicles

X Pan, Y Jin, Z Wang, F Li - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
During the past few years, as Internet of Things develops rapidly, the applications of
unmanned aerial vehicle (UAV) technology have been increasingly widely used …

Provably Secure Client‐Server Key Management Scheme in 5G Networks

L Yang, YC Chen, TY Wu - Wireless Communications and …, 2021 - Wiley Online Library
The increasing demand for real‐time data transmission in wireless mobile communication
networks has promoted the maturity of mobile communication technology. Fifth‐generation …