A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting |
Oh, Sang Yun
(Korea University)
Jeong, Jae Yeol (Korea University) Jeong, Ik Rae (Korea University) Byun, Jin Wook (Pyeongtaek University) |
1 | M. Gharibi, R. Boutaba, and S. L. Waslander. "Internet of drones," IEEE Access, vol. 4, pp. 1148-1162, Mar. 2016. DOI |
2 | I. Chlamtac, M. Conti, and J. J-N. Liu, "Mobile ad hoc networking: imperatives and challenges," Ad hoc networks, vol. 1, no. 1, pp. 13-64, Jul. 2003. DOI |
3 | W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," Proceedings of the 33rd annual Hawaii international conference on system sciences. IEEE, Jan. 2000. |
4 | R. I. da Silva, and M. A. Nascimento, "On best drone tour plans for data collection in wireless sensor network," Proceedings of the 31st annual ACM symposium on applied computing, Apr. 2016. |
5 | R. Amin, and G. P. Biswas, "A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks," Ad Hoc Networks, vol. 36, pp. 58-80, Jan. 2016. DOI |
6 | J. Srinivas, S. Mukhopadhyay, and D. Mishra, "Secure and efficient user authentication scheme for multi-gateway wireless sensor networks," Ad Hoc Networks, vol. 54, pp. 147-169, Jan. 2017. DOI |
7 | M. Wazid, A. K. Das, N. Kumar, A. V. Vasilakos, and J. J. Rodrigues, "Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of drones deployment," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3572-3584, Dec. 2018. DOI |
8 | Y. Yao, and J. Gehrke. "The cougar approach to in-network query processing in sensor networks," ACM Sigmod record, vol. 31, no. 3, pp 9-18, Sep. 2002. DOI |
9 | D. B. David, "Secure and efficient mutual adaptive user authentication scheme for heterogeneous wireless sensor networks using multimedia client-server systems," Wireless Personal Communications, vol. 87, no. 3, pp. 1013-1035, May. 2016. DOI |
10 | L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, no. 15, pp. 2787-2805, May. 2010. DOI |
11 | N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," International workshop on cryptographic hardware and embedded systems. Springer, pp. 11-132, 2004. |
12 | J. Tang, H. Huang, S. Guo, and Y. Yang, "Dellat: Delivery latency minimization in wireless sensor networks with mobile sink," Journal of Parallel and Distributed Computing, vol. 83, pp. 133-142, Sep. 2015. DOI |
13 | F. Al-Turjman, Y. K. Ever, E. Ever, and H. X. Nguyen, "Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks," IEEE Access, vol. 5, pp. 24617-24631, Oct. 2017. DOI |
14 | Y. K. Ever, "A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications," Computer Communications, vol. 155, pp.143-149, Apr. 2020. DOI |
15 | W. Jongho, S. Seung-Hyun, and E. Bertino, "Certificateless cryptographic protocols for efficient drone-based smart city applications," IEEE Access, vol. 5, pp. 3721-3749, Mar. 2017. DOI |
16 | B. D. Deebak, and F. Al-Turjman, "A smart lightweight privacy preservation scheme for IoT-based UAV communication systems," Computer Communications, vol. 162, pp. 102-117, Oct. 2020. DOI |
17 | T. Alladi, V. Chamola, and N. Kumar, "PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks," Computer Communications, vol. 160, pp. 81-90, Jul. 2020. DOI |