Security in internet of drones: A comprehensive review

S Samanth, P KV, M Balachandra - Cogent Engineering, 2022 - Taylor & Francis
Abstract Unmanned Aerial Vehicles (UAVs), also called drones, are used for various
applications with two basic classifications: civilian and military drones. Civilian drones are …

[HTML][HTML] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles

VO Nyangaresi - High-Confidence Computing, 2023 - Elsevier
Unmanned aerial vehicles offer services such as military reconnaissance in potentially
adversarial controlled regions. In addition, they have been deployed in civilian critical …

Design and analysis of lightweight authentication protocol for securing IoD

SU Jan, F Qayum, HU Khan - Ieee access, 2021 - ieeexplore.ieee.org
The Internet-of-drones (IoD) environment is a layered network control architecture designed
to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) …

A verifiably secure ECC based authentication scheme for securing IoD using FANET

SU Jan, IA Abbasi, F Algarni, AS Khan - IEEE Access, 2022 - ieeexplore.ieee.org
Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee
secure communication through unfavorable and unsafe channels. The speedy development …

S-MAPS: Scalable mutual authentication protocol for dynamic UAV swarms

G Bansal, B Sikdar - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) domain has seen rapid developments in recent years.
UAVs have been deployed for many applications and missions like data transmission …

A comprehensive collection and analysis model for the drone forensics field

FM Alotaibi, A Al-Dhaqm, YD Al-Otaibi, AA Alsewari - Sensors, 2022 - mdpi.com
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be
applied to several purposes, especially in smart cities. These involve traffic observation …

A Conceptual Digital Forensic Investigation Model Applicable to the Drone Forensics Field

F Alotaibi, A Al-Dhaqm, YD Al-Otaibi - Engineering, Technology & Applied …, 2023 - etasr.com
Although there is a considerable amount of studies in drone forensics that describe
numerous practical and technical perspectives, there is a lack of a comprehensive …

MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

ZA Abduljabbar, VO Nyangaresi, J Ma… - … Conference on Future …, 2022 - Springer
Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains
such as in the military. As such, the data exchanged between the operators and these aerial …

Authentication methods for UAV communication

M Rodrigues, J Amaro, FS Osório… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Unmanned Aerial Systems (UASs) are being employed in many different applications, and
with the increased usage security concerns become more accentuated. Communication …

A novel forensic readiness framework applicable to the drone forensics field

FM Alotaibi, A Al-Dhaqm… - Computational …, 2022 - Wiley Online Library
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the
identification, capture, preservation, reconstruction, analysis, and documentation of drone …