Secure communication in IOT-based UAV networks: A systematic survey

J Sharma, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract IoT (Internet of Things) has revolutionized the world with its applications like home
automation, transportation, agriculture, etc. IoT-based Unmanned Aerial Vehicle (UAV) …

Internet of drones security: Taxonomies, open issues, and future directions

A Derhab, O Cheikhrouhou, A Allouch, A Koubaa… - Vehicular …, 2023 - Elsevier
Drones have recently become one of the most important technological breakthroughs. They
have opened the horizon for a vast array of applications and paved the way for a diversity of …

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

M Tanveer, A Badshah, H Alasmary, SA Chaudhry - Internet of Things, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) revolutionizes industrial production using
smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit …

A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment

C Pu, A Wall, KKR Choo, I Ahmed… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With accelerated advances in various technologies, drones, better known as unmanned
aerial vehicles (UAVs), are increasingly commonplace and consequently have a more …

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

SAAF-IoD: Secure and anonymous authentication framework for the Internet of Drones

M Tanveer, H Alasmary, N Kumar… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Internet of Drones (IoD) offers several advantages, such as enabling ground
communications in areas with connectivity limitations due to physical obstacles. However …

REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things

M Tanveer, A Alkhayyat, N Kumar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the widespread utilization of Internet-enabled smart devices (SDs), the Industrial
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …

ESCI-AKA: Enabling secure communication in an iot-enabled smart home environment using authenticated key agreement framework

H Alasmary, M Tanveer - Mathematics, 2023 - mdpi.com
Smart home environments are a vital component of the larger ecosystem within smart cities,
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …

Radar sensor based machine learning approach for precise vehicle position estimation

M Sohail, AU Khan, M Sandhu, IA Shoukat, M Jafri… - Scientific Reports, 2023 - nature.com
Estimating vehicles' position precisely is essential in Vehicular Adhoc Networks (VANETs)
for their safe, autonomous, and reliable operation. The conventional approaches used for …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …