A review on software-based and hardware-based authentication mechanisms for the internet of drones

ET Michailidis, D Vouyioukas - Drones, 2022 - mdpi.com
During the last few years, a wide variety of Internet of Drones (IoD) applications have
emerged with numerous heterogeneous aerial and ground network elements …

Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security

N Kumar, A Chaudhary - Computer Networks, 2024 - Elsevier
Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with
time from military operations like surveillance, reconnaissance to commercial operations …

Authenticated wireless links between a drone and sensors using a blockchain: Case of smart farming

KS Alqarni, FA Almalki, BO Soufiene… - Wireless …, 2022 - Wiley Online Library
Agriculture is confronted with several significant difficulties, such as rising air temperatures
and population growth, causing the implementation of smart farming operations as an …

Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environment

S Perumalla, S Chatterjee, APS Kumar - Theoretical Computer Science, 2023 - Elsevier
Abstract Internet of Drones (IoD) is a decentralized network and management framework
which connects drones' access to the limited airspace and offers inter-location navigation …

PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication

L Chen, Y Zhu, S Liu, H Yu, B Zhang - Computer Communications, 2024 - Elsevier
The evolving UAV swarm flight environment exacerbates the difficulty of secure message
delivery within the swarm. Physical Unclonable Functions (PUFs) have the potential to …

[HTML][HTML] Анализ рисков нарушения информационной безопасности в роевых робототехнических системах при масштабировании численности агентов

ВИ Петренко, ФБ Тебуева, АС Павлов… - … журнал: управление и …, 2022 - cyberleninka.ru
Применение роевых робототехнических систем (РРТС) в сложных прикладных задачах
позволяет существенно увеличить эффективность решения подобных задач. При этом …

Efficient Vehicular Data Sharing using Aerial P2P Backbone

AI Ameur, OS Oubbati, A Lakas… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Peer-to-Peer (P2P) concept within Vehicular Ad-Hoc Networks (VANETs) facilitates
instantaneous information sharing among vehicles, leading to a seamless exchange of …

[PDF][PDF] Hyperelliptic curve based authentication for the internet of drones

AAM Gnanaraj, F Abbasali, AS Kumar… - Int J Reconfigurable & …, 2024 - academia.edu
Drones provide an alternative progression in protection submissions since they are capable
of conducting autonomous seismic investigations. Recent advancement in unmanned aerial …

Протокол делегированной аутентификации новых агентов при масштабировании численности агентов в роевых робототехнических системах

АС Павлов, НЮ Свистунов, ВИ Петренко… - Вестник ВГУ. Серия …, 2022 - journals.vsu.ru
Аннотация Интенсивное развитие групповой робототехники, в том числе роевых
робототехнических систем (РРТС), актуализирует вопросы обеспечения …

Distributed Ledger Data Exchange Model Based on a Multilayer Approach

S Vorobyev, S Shirobokova… - … Conference on Industrial …, 2022 - ieeexplore.ieee.org
As part of the modern approach to “digitalization”, distributed ledger systems are used more
intensively as promising tools with a breakthrough innovative potential. This paper presents …