161–174 (2002)īresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: Public Key Cryptography - PKC 2003, pp. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (2015)īoyd, C., Nieto, J.M.: Round-optimal contributory conference key agreement. Won, J., Seo, S.-H., Bertino, E.: A secure communication protocol for drones and smart objects. Tedeschi, P., Sciancalepore, S., Eliyan, A., Di Pietro, R.: LiKe: lightweight certificateless key agreement for secure IoT communications. In: 2008 International Symposium on Ubiquitous Multimedia Computing (2008) Lee, E.-J., Lee, S.-E., Yoo, K.-Y.: A certificateless authenticated group key agreement protocol providing forward secrecy. In: Advances in Cryptology - ASIACRYPT 2003, pp. Īl-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. Kumar, V., Kumar, R., Pandey, S.K.: A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. Tian, B., Han, S., Jiankun, H., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. Xiong, H., Yan, W., Zhenyu, L.: A survey of group key agreement protocols with constant rounds. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011 (2011) Yang, G., Tan, C.-H.: Strongly secure certificateless key exchange without pairing. Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel pairing-free certificateless authenticated key agreement protocol with provable security. In: 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC) (2018) Semal, B., Markantonakis, K., Akram, R.N.: A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: Proceedings of the 5th International Conference on Internet of Things, Big Data and Security (2020) In: Proceedings of the 5th International Conference on Internet of Things, Big Data and Security (2020)įrimpong, E., Michalas, A.: IoT-CryptoDiet: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in Contiki-NG. In: 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC) (2017)įrimpong, E., Bakas, A., Dang, H.-V., Michalas, A.: Do not tell me what i cannot do! (the constrained device shouted under the cover of the fog): implementing symmetric searchable encryption on constrained devices. 1(2), 1–25 (2017)Īkram, R.N., et al.: Security, privacy and safety evaluation of dynamic and static fleets of drones. ACM 62(11), 19–21 (2019)Īltawy, R., Youssef, A.M.: Security, privacy, and safety aspects of civilian drones. Kugler, L.: Real-world applications for drones. Certificateless public key cryptography.We extensively prove the security of our scheme and demonstrate its real-world applicability by evaluating its performance on three different kinds of drone boards (UP Xtreme i7 board, SamL11-Xpro board, and a Zolertia Re-mote Revb board). The proposed scheme ensures key freshness, group key secrecy, forward secrecy, and backward secrecy while ensuring that the scheme is lightweight enough to be implemented on very resource-constrained drones or smart devices. However, in this paper, we propose a pairing-free certificateless group authenticated key distribution protocol for drone-based applications which takes into consideration drones with varying computational resources. The majority of existing works in this field focus on the use of symmetric key cryptographic schemes or group key agreement schemes. Owing to this increasing popularity, researchers have begun to pay attention to the communication security requirements involved in deploying drone-based applications and services on a large scale, with particular emphasis on group communication. Drone-based applications continue to garner a lot of attention due to their significant potential in both commercial and non-commercial use.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |