HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
The unmanned aerial vehicles (UAVs) in military and civilian systems access sensitive data via cellular networks and are ubiquitous. Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to...
| Main Authors: | Khalid, Haqi, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam, Syed Ahamed, Sharifah Mumtazah, Chaudhary, Muhammad Akmal, Altarturi, Hamza H. M., Saadoon, Muntadher |
|---|---|
| Format: | Article |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/108191/ |
Similar Items
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Fast and secure handover authentication scheme in Mobile WiMax
by: Zmezm, Hamzah F., et al.
Published: (2014)
by: Zmezm, Hamzah F., et al.
Published: (2014)
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Cross-SN: a lightweight authentication scheme for a multi-server platform using IoT-based wireless medical sensor network
by: Ismail, Haqi Khalid, et al.
Published: (2021)
by: Ismail, Haqi Khalid, et al.
Published: (2021)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Authentication process enhancements in WiMAX networks
by: Alezabi, Kamal Ali, et al.
Published: (2016)
by: Alezabi, Kamal Ali, et al.
Published: (2016)
An efficient authentication and key agreement protocol for 4G (LTE) networks
by: Alezabi, Kamal Ali, et al.
Published: (2014)
by: Alezabi, Kamal Ali, et al.
Published: (2014)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A new tunnelled EAP based authentication method for WiMAX networks
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
by: Alezabi, Kamal Ali, et al.
Published: (2020)
by: Alezabi, Kamal Ali, et al.
Published: (2020)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
Workflow system for MapReduce in cloud environment
by: Wadi, Muntadher Saadoon
Published: (2017)
by: Wadi, Muntadher Saadoon
Published: (2017)
Evaluation of authentication latency using predictive context transfer to support fast handover
by: Mohamad Hasnan, Siti Norhaizum, et al.
Published: (2017)
by: Mohamad Hasnan, Siti Norhaizum, et al.
Published: (2017)
UAV/drone zoning in urban planning: review on legals and privacy
by: Hj. Mohd. Noor, Norzailawati, et al.
Published: (2017)
by: Hj. Mohd. Noor, Norzailawati, et al.
Published: (2017)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
Multi-criteria handover decision for heterogeneous networks: carrier aggregation deployment scenario
by: Ahmed, Maryam Abdulazeez, et al.
Published: (2020)
by: Ahmed, Maryam Abdulazeez, et al.
Published: (2020)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
Comments and improvements of “HOTA: Handover optimized
ticketbased authentication in networkbased mobility
management”
by: Alizadeh, Mojtaba, et al.
Published: (2017)
by: Alizadeh, Mojtaba, et al.
Published: (2017)
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
by: Ismail, Haqi Khalid
Published: (2018)
by: Ismail, Haqi Khalid
Published: (2018)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
"I'd be so much more comfortable posting anonymously": Identified versus anonymous participation in student discussion boards
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
The introduction of broker anonymity on the New Zealand Exchange
by: Poskitt, Russell, et al.
Published: (2011)
by: Poskitt, Russell, et al.
Published: (2011)
Get rid of yourself: toward an aesthetics of anonymity
by: Eckersley, David
Published: (2019)
by: Eckersley, David
Published: (2019)
A tracable proactive anonymous electronic cash
by: Chang, Yu Cheng, et al.
Published: (2000)
by: Chang, Yu Cheng, et al.
Published: (2000)
Predictive zoning of pest and disease infestations in rice field based on uav aerial imagery
by: Abd. Kharim, Muhammad Nurfaiz, et al.
Published: (2022)
by: Abd. Kharim, Muhammad Nurfaiz, et al.
Published: (2022)
Evaluation of handover latency in intra-domain mobility
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
Notions of anonymous existence in Martin-Löf type theory
by: Kraus, Nicolai, et al.
Published: (2016)
by: Kraus, Nicolai, et al.
Published: (2016)
Student evaluation surveys: anonymous comments that offend or are unprofessional
by: Tucker, Beatrice
Published: (2014)
by: Tucker, Beatrice
Published: (2014)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
Review of channel quality indicator estimation schemes for multi-user MIMO in 3GPP LTE/LTE-a systems
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2014)
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2014)
A threshold feedback compression scheme of channel quality indicator (CQI) in LTE systems
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
Approximate linear minimum mean square error estimation based on channel quality indicator feedback in LTE systems
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
Handover parameters optimisation techniques in 5G networks
by: Saad, Wasan Kadhim, et al.
Published: (2021)
by: Saad, Wasan Kadhim, et al.
Published: (2021)
Similar Items
-
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
by: Khalid, Haqi, et al.
Published: (2021) -
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
by: Khalid, Haqi, et al.
Published: (2021) -
Fast and secure handover authentication scheme in Mobile WiMax
by: Zmezm, Hamzah F., et al.
Published: (2014) -
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
by: Khalid, Haqi, et al.
Published: (2021) -
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
by: Khalid, Haqi, et al.
Published: (2021)