SHOTS: Scalable Secure Authentication-Attestation Protocol Using Optimal Trajectory in UAV Swarms.
Gaurang BansalNaren NarenVinay ChamolaBiplab SikdarPublished in: IEEE Trans. Veh. Technol. (2022)
Keyphrases
- trusted third party
- authentication protocol
- mutual authentication
- security analysis
- key distribution
- password authentication
- lightweight
- third party
- key agreement protocol
- user authentication
- authentication mechanism
- privacy protection
- security protocols
- covert channel
- smart card
- cryptographic protocols
- authentication scheme
- digital signature
- security mechanisms
- data encryption
- key management
- private key
- secure communication
- key agreement
- security services
- key exchange protocol
- dynamic environments
- diffie hellman
- security requirements
- rfid tags
- session key
- credit card
- key exchange
- video data
- rfid systems
- trusted computing
- identity management
- integrity verification
- public key