batch authentication
Recently Published Documents


TOTAL DOCUMENTS

38
(FIVE YEARS 16)

H-INDEX

7
(FIVE YEARS 3)

Drones ◽  
2022 ◽  
Vol 6 (1) ◽  
pp. 14
Author(s):  
Arun Sekar Rajasekaran ◽  
Azees Maria ◽  
Fadi Al-Turjman ◽  
Chadi Altrjman ◽  
Leonardo Mostarda

As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a result, new technologies between user/control station and UAVs have been developed. FANET (Flying Ad-Hoc Network) is a subset of the MANET (Mobile Ad-Hoc Network) that includes UAVs. UAVs, simply called drones, are used for collecting sensitive data in real time. The security and privacy of these data are of priority importance. Therefore, to overcome the privacy and security threats problem and to make communication between the UAV and the user effective, a competent anonymous mutual authentication scheme is proposed in this work. There are several methodologies addressed in this work such as anonymous batch authentication in FANET which helps to authenticate a large group of drones at the same time, thus reducing the computational overhead. In addition, the integrity preservation technique helps to avoid message alteration during transmission. Moreover, the security investigation section discusses the resistance of the proposed work against different types of possible attacks. Finally, the proposed work is related to the prevailing schemes in terms of communication and computational cost and proves to be more efficient.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Yuhao Yang ◽  
Xiujie Huang ◽  
Jinyu Hu

Internet of vehicles (IoV), a novel technology, holds paramount importance within the transportation domain due to its ability to increase traffic efficiency and safety. Information privacy is of vital importance in IoV when sharing information among vehicles. However, due to the openness of the communication network, information sharing is vulnerable to potential attacks, such as impersonation, modification, side-channel and replay attacks, and so on. In order to resolve the aforementioned problem, we present a conditional privacy-preserving batch authentication (CPPBA) scheme based on elliptic curve cryptography (ECC). The proposed scheme avoids the certificate management problem, conducing to efficiency improvement. When a message is transmitted by a vehicle, its pseudo identity rather than the real identity is also broadcasted along with the shared message, which protects the privacy of the vehicle’s identity. But this privacy is conditional because TA and only the TA can reveal the real identity of the vehicle by tracing. The proposed scheme is batch verifiable, which reduces the computation costs. In addition, our scheme does not involve bilinear pairing operations and does not use the map-to-point hash function, thus making the verification process more effective. An exhaustive efficiency comparison has been carried to show that the proposed CPPBA scheme has lower computation, communication, and storage overheads than the state-of-the-art ones. A relatively comprehensive security analysis has also been carried, which not only shows that the signature design in the CPPBA scheme is unforgeable under the random oracle model but also illustrates that the CPPBA scheme is resistant to various potential attacks. The security is also verified by a popular automated simulation tool, that is, AVISPA.


2021 ◽  
Vol 96 ◽  
pp. 107532
Author(s):  
Jegadeesan Subramani ◽  
Tu N. Nguyen ◽  
Azees Maria ◽  
Arun Sekar Rajasekaran ◽  
Korhan Cengiz

2021 ◽  
Vol 167 ◽  
pp. 48-54
Author(s):  
Junbin Kang ◽  
Kai Fan ◽  
Kuan Zhang ◽  
Xiaochun Cheng ◽  
Hui Li ◽  
...  

Author(s):  
Zhenguo Gao ◽  
Haijun Wang ◽  
Liling Fan ◽  
Yan Chen ◽  
Scott Chih-Hao Huang ◽  
...  

Author(s):  
Pandi Vijayakumar ◽  
Maria Azees ◽  
Sergei A. Kozlov ◽  
Joel J. P. C. Rodrigues

2020 ◽  
pp. 101877
Author(s):  
Palak Bagga ◽  
Anil Kumar Sutrala ◽  
Ashok Kumar Das ◽  
Pandi Vijayakumar

2020 ◽  
Vol 58 (7) ◽  
pp. 35-41
Author(s):  
Guangquan Xu ◽  
Xiaotong Li ◽  
Litao Jiao ◽  
Weizhe Wang ◽  
Ao Liu ◽  
...  

2020 ◽  
Vol 7 (4) ◽  
pp. 3462-3473 ◽  
Author(s):  
Jing Zhang ◽  
Hong Zhong ◽  
Jie Cui ◽  
Yan Xu ◽  
Lu Liu

Sign in / Sign up

Export Citation Format

Share Document