Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
by
Chen, Chin-Ling
, Li, Chun-Ta
, Lee, Cheng-Chi
, Deng, Yong-Yuan
, Weng, Chi-Yao
, Imoize, Agbotiname Lucky
in
Armed forces
/ authentication
/ Cameras
/ Communication
/ Computer Security
/ Drones
/ Energy efficiency
/ Humans
/ Internet of Drones
/ Internet of Things
/ Medical supplies
/ Military air strikes
/ Network security
/ Privacy
/ privacy preservation
/ Reproducibility of Results
/ security
/ Security management
/ Sensors
/ session key agreement
/ Smartphones
/ Surveillance
/ Unmanned aerial vehicles
/ Wireless access points
/ Wireless Technology
/ Wireless telecommunications equipment
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
by
Chen, Chin-Ling
, Li, Chun-Ta
, Lee, Cheng-Chi
, Deng, Yong-Yuan
, Weng, Chi-Yao
, Imoize, Agbotiname Lucky
in
Armed forces
/ authentication
/ Cameras
/ Communication
/ Computer Security
/ Drones
/ Energy efficiency
/ Humans
/ Internet of Drones
/ Internet of Things
/ Medical supplies
/ Military air strikes
/ Network security
/ Privacy
/ privacy preservation
/ Reproducibility of Results
/ security
/ Security management
/ Sensors
/ session key agreement
/ Smartphones
/ Surveillance
/ Unmanned aerial vehicles
/ Wireless access points
/ Wireless Technology
/ Wireless telecommunications equipment
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
by
Chen, Chin-Ling
, Li, Chun-Ta
, Lee, Cheng-Chi
, Deng, Yong-Yuan
, Weng, Chi-Yao
, Imoize, Agbotiname Lucky
in
Armed forces
/ authentication
/ Cameras
/ Communication
/ Computer Security
/ Drones
/ Energy efficiency
/ Humans
/ Internet of Drones
/ Internet of Things
/ Medical supplies
/ Military air strikes
/ Network security
/ Privacy
/ privacy preservation
/ Reproducibility of Results
/ security
/ Security management
/ Sensors
/ session key agreement
/ Smartphones
/ Surveillance
/ Unmanned aerial vehicles
/ Wireless access points
/ Wireless Technology
/ Wireless telecommunications equipment
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
Journal Article
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
2022
Request Book From Autostore
and Choose the Collection Method
Overview
In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the controller from a designated environment via wireless communication technologies. The mobility, flexibility, reliability and energy efficiency of drones makes them more widely used in IoT environments such as commercial, military, entertainment applications, traffic surveillance and aerial photography. In a generalized IoD architecture, we have communications among the drones in a flying zone, among the drones and the control server, and also among the drones and authorized user. IoD still has many critical issues that need to be addressed, such as data access being carried out through a public channel and battery operated drones. To address these concerns in IoD communications, in this paper, an efficient authentication and secure communication scheme with privacy preservation is proposed and it only uses secure one-way hash function and bitwise XOR operations when control server, drone and user mutually authenticate each other. After the successful authentication, both IoD-based participants can agree on a common session key to secure the subsequent communication messages. The widely accepted ProVerif and BAN logic analysis have been used to assure that the proposed scheme is provably secure against existing well-known security attacks and ensures privacy. Finally, a comparative analysis is presented to demonstrate the proposed scheme preserves efficiency when compared to existing competitive schemes.
This website uses cookies to ensure you get the best experience on our website.