Swarm of UAVs for network management in 6G: A technical review

MA Khan, N Kumar, SAH Mohsan… - … on Network and …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G)
networks, which are capable of incorporating autonomous services to swarm of unmanned …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - IEEE Access, 2021 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …

A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems

MA Khan, I Ullah, A Alkhalifah… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this article, unmanned aerial vehicles (UAVs) are expected to play a key role in improving
the safety and reliability of transportation systems, particularly where data traffic is …

[HTML][HTML] A review on communications perspective of flying ad-hoc networks: key enabling wireless technologies, applications, challenges and open research topics

F Noor, MA Khan, A Al-Zahrani, I Ullah, KA Al-Dhlan - Drones, 2020 - mdpi.com
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military
applications, are presently finding their way in many civilian and commercial applications. If …

An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks

MA Khan, I Ullah, N Kumar, OS Oubbati… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single
large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the …

Secure UAV-aided mobile edge computing for IoT: A review

ET Michailidis, K Maliatsos, DN Skoutas… - IEEE …, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …

A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)

S Hussain, I Ullah, H Khattak, MA Khan… - Journal of Information …, 2021 - Elsevier
Abstract Recently, the Industrial Internet of Things (IIoT) has become increasingly important
for applications in the industry. IIoT has essentially become a prime security focus for …

An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) …

I Ullah, NU Amin, MA Khan, H Khattak… - Journal of Medical …, 2021 - Springer
Mobile health (M-Health) system is the remote form of Wireless Body Area Networks
(WBAN), which can be used for collecting patient's health data in real-time with mobile …

A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for Internet of Things enabled smart grid

S Hussain, I Ullah, H Khattak, M Adnan, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
A smart grid is a new ecosystem, which is made by combining a number of smart Internet of
Things (IoT) devices that manage wide energy sources by increasing the efficiency and …

A provably secure authentication and key exchange protocol in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, CM Chen - Security and Communication …, 2021 - Wiley Online Library
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …