GCACS-IoD: A certificate based generic access control scheme for Internet of drones

نویسندگان

چکیده

Internet of drones (IoD) has gained significant importance in recent times due to its applications several critical domains ranging from commercial defense and rescue operations. With flying different zones carry out specified tasks, the IoD can be beneficial gather real time data for interpretation by users. However, access is carried through an open channel battery operated drones. Therefore, drones’ security privacy are crucial accomplishing mission-critical, safety-critical, or surveillance In 2020, Bera et al. presented a certificate based control scheme securing argued scheme’s formal informal methods. analysis this paper shows that does not provide anonymity insecure against multiple threats, including drone impersonation, man middle, replay attacks. We then designed generic inter-drone ground station control/authentication domain (GCACS-IoD). The GCACS-IoD provably secure known attacks provides anonymity. extends while preserving computation communication efficiencies.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Multi - Stage Filtering Scheme for Internet Access Control Ghassan

ةیتوبكنعلا ةكبشلا و ينورتكللإا ثدحتلا و دیربلا لثم ةددعتملا اھتامدخب تینرتنلإا ةكبش ربتعت لا تامولعملا لدابت و لقنل ةیلاعف رثكلأا ةقیرط . يتلا تایوتحملاب ةمحدزم تدغ ةكبشلا هذھ نأ لاإ امداصت تببس " احضاو " امداصت لب اندیلاقت و انتاداع عم " نوناقلا عم . ةلیلق و ةئیذبلا عقاوملا ةیرصنعلا و ةیھاركلا ىلع عجشت يتلا عقاوملا و ةیحابلإا تایوتحملا تاذ ماشتحلاا لاإ تسیل يھ لافطلأا مھنمض نم و تینرتنلإا ةكبش...

متن کامل

Certificate-Based Encryption Scheme with General Access Structure

The protection of sensitive information is very important, but also a difficult task. It usually requires a centralised access policy management and control system. However, such solution is often not acceptable in the era of users’ mobility. In the paper we propose a certificate-based group-oriented encryption scheme with an effective secret sharing scheme based on general access structure. Th...

متن کامل

A Certificate-Based Signature Scheme

In this paper, we propose the security notion of certificate-based signature that uses the same parameters and certificate revocation strategy as the encryption scheme presented at Eurocrypt 2003 by Gentry. Certificate-based signature preserves advantages of certificatebased encryption, such as implicit certification and no private key escrow. We present concrete certificate-based signature sch...

متن کامل

Certificate-Based Access Control and Authentication for DHCP

In the current Dynamic Host Configuration Protocol, security is not considered. DHCP itself does support neither an access control for a proper user nor the mechanism with which clients and servers authenticate each other. In this paper, we introduce a novel authentication and access control mechanism for DHCP systems. This solution defines a new DHCP option that provides the authentication of ...

متن کامل

Certificate-based Access Control for Widely Distributed Resources

We have implemented and deployed an access control mechanism that uses digitally-signed certificates to define and enforce an access policy for a set of distributed resources that have multiple, independent and geographically dispersed stakeholders. The stakeholders assert their access requirements in use-condition certificates and designate those trusted to attest to the corresponding user att...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Networks

سال: 2021

ISSN: ['1872-7069', '1389-1286']

DOI: https://doi.org/10.1016/j.comnet.2021.107999