Authentication and Handover Challenges and Methods for Drone Swarms

نویسندگان

چکیده

Drones are begin used for various purposes such as border security, surveillance, cargo delivery, visual shows and it is not possible to overcome intensive tasks with a single drone. In order expedite performing tasks, drone swarms employed. The number of drones in swarm can be high depending on the assigned duty. current solution authenticate using 5G new radio (NR) network requires execution two steps. first step covers authentication between core network, second control station. It feasible each without causing significant latency. Authentication keys base station (BS) user equipment (UE) must shared BS while handover. heavily mobile require several handovers from BS. Sharing explained NR scalable swarms. Also, UE or access node board unmanned aerial vehicle (UxNB). A UxNB may provide service rural area emergency. increase process sharing vulnerable eavesdropping due wireless connectivity. this work, we present method where time communication joining less than NR. addition, group-based handover solutions scenarios which stations terrestrial proposed scalability latency issues

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Drone-based Privacy Interfaces: Opportunities and Challenges

Providing users with awareness and control about privacysensitive information flows is a major challenge in Internet of Things scenarios, because of constrained input and output capabilities of the involved sensors and devices. We propose the use of autonomous personal drones, specifically nanocopters, as device-independent drone-based privacy interfaces. Nanocopters have the potential to indic...

متن کامل

Multihop Routing of Telemetry Data in Drone Swarms

In 2015, a group of Naval Postgraduate School (NPS) professors and students set the record for largest fixed-wing unmanned aerial vehicle (UAV) swarm flown at one time. The swarm had 50 vehicles flying simultaneously and successfully demonstrated distributed decision-making with all processing occurring on swarm vehicles rather than a centralized control station. Much of the decision-making is ...

متن کامل

development of different optical methods for determination of glucose using cadmium telluride quantum dots and silver nanoparticles

a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...

Distribution of EAP-Based Keys for Handover and Re-Authentication

This document describes an abstract mechanism for delivering root keys from an Extensible Authentication Protocol (EAP) server to another network server that requires the keys for offering security protected services, such as re-authentication, to an EAP peer. The distributed root key can be either a usage-specific root key (USRK), a domain-specific root key (DSRK), or a domain-specific usagesp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE journal of radio frequency identification

سال: 2022

ISSN: ['2469-7281', '2469-729X']

DOI: https://doi.org/10.1109/jrfid.2022.3158392