Security analysis of drones systems: Attacks, limitations, and recommendations

JP Yaacoub, H Noura, O Salman, A Chehab - Internet of Things, 2020 - Elsevier
Recently, the world witnessed a significant increase in the number of used drones, with a
global and continuous rise in the demand for their multi-purpose applications. The pervasive …

A lightweight authentication and key agreement scheme for Internet of Drones

Y Zhang, D He, L Li, B Chen - Computer Communications, 2020 - Elsevier
Abstract Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport
the commodity with the help of embedded various sensors. They have been widely used in …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A secure and lightweight drones-access protocol for smart city surveillance

MW Akram, AK Bashir, S Shamshad… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to
offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay …

Certificateless two-party authenticated key agreement scheme for smart grid

L Deng, R Gao - Information Sciences, 2021 - Elsevier
Smart grid is a fully automated power transmission network. It monitors and controls each
user and grid node to ensure bidirectional flow of information and power between all nodes …

A secure communication protocol for drones and smart objects

J Won, SH Seo, E Bertino - Proceedings of the 10th ACM symposium on …, 2015 - dl.acm.org
In many envisioned drone-based applications, drones will communicate with many different
smart objects, such as sensors and embedded devices. Securing such communications …

Certificateless cryptographic protocols for efficient drone-based smart city applications

J Won, SH Seo, E Bertino - IEEE Access, 2017 - ieeexplore.ieee.org
Smart cities aim to improve the quality of urban services and their energy efficiency by
utilizing information and communication technologies. In such context, drones can be …

Routing protocols & unmanned aerial vehicles autonomous localization in flying networks

IU Khan, SBH Shah, L Wang, MA Aziz… - International Journal …, 2021 - Wiley Online Library
Nowadays, as the world is transformed because of the interconnectivity, there we see
several issues regarding security which is supposed to be one of the biggest problems for …

[HTML][HTML] An efficient certificateless two-party authenticated key agreement protocol

D He, S Padhye, J Chen - Computers & Mathematics with Applications, 2012 - Elsevier
Since certificateless public key cryptography (CLPKC) has received widespread attention
due to its efficiency in avoiding key escrow problems in identity-based public key …

[HTML][HTML] A new two-round certificateless authenticated key agreement protocol without bilinear pairings

D He, Y Chen, J Chen, R Zhang, W Han - Mathematical and Computer …, 2011 - Elsevier
Certificateless public key cryptography (CLPKC), which can simplify the complex certificate
management in the traditional public key cryptography and resolve the key escrow problem …