Authentication and Handover Challenges and Methods for Drone Swarms
نویسندگان
چکیده
Drones are begin used for various purposes such as border security, surveillance, cargo delivery, visual shows and it is not possible to overcome intensive tasks with a single drone. In order expedite performing tasks, drone swarms employed. The number of drones in swarm can be high depending on the assigned duty. current solution authenticate using 5G new radio (NR) network requires execution two steps. first step covers authentication between core network, second control station. It feasible each without causing significant latency. Authentication keys base station (BS) user equipment (UE) must shared BS while handover. heavily mobile require several handovers from BS. Sharing explained NR scalable swarms. Also, UE or access node board unmanned aerial vehicle (UxNB). A UxNB may provide service rural area emergency. increase process sharing vulnerable eavesdropping due wireless connectivity. this work, we present method where time communication joining less than NR. addition, group-based handover solutions scenarios which stations terrestrial proposed scalability latency issues
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملDrone-based Privacy Interfaces: Opportunities and Challenges
Providing users with awareness and control about privacysensitive information flows is a major challenge in Internet of Things scenarios, because of constrained input and output capabilities of the involved sensors and devices. We propose the use of autonomous personal drones, specifically nanocopters, as device-independent drone-based privacy interfaces. Nanocopters have the potential to indic...
متن کاملMultihop Routing of Telemetry Data in Drone Swarms
In 2015, a group of Naval Postgraduate School (NPS) professors and students set the record for largest fixed-wing unmanned aerial vehicle (UAV) swarm flown at one time. The swarm had 50 vehicles flying simultaneously and successfully demonstrated distributed decision-making with all processing occurring on swarm vehicles rather than a centralized control station. Much of the decision-making is ...
متن کاملdevelopment of different optical methods for determination of glucose using cadmium telluride quantum dots and silver nanoparticles
a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...
Distribution of EAP-Based Keys for Handover and Re-Authentication
This document describes an abstract mechanism for delivering root keys from an Extensible Authentication Protocol (EAP) server to another network server that requires the keys for offering security protected services, such as re-authentication, to an EAP peer. The distributed root key can be either a usage-specific root key (USRK), a domain-specific root key (DSRK), or a domain-specific usagesp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE journal of radio frequency identification
سال: 2022
ISSN: ['2469-7281', '2469-729X']
DOI: https://doi.org/10.1109/jrfid.2022.3158392