1 |
PARIHAR A S, CHAKRABORTY S K. Flying ad hoc network (FANET): opportunities, trending applications and simulators[C]// Proc. of the IEEE Pune Section International Conference, 2022.
|
2 |
WU S H , SHEU J P , KING C T . Unilateral wakeup for mobile ad hoc networks with group mobility[J]. IEEE Trans.on Mobile Computing, 2012, 12 (12): 2507- 2517.
|
3 |
LEE S W , ALI S , YOUSEFPOOR M S , et al. An energy-aware and predictive fuzzy logic-based routing scheme in flying ad hoc networks (FANETs)[J]. IEEE Access, 2021, 9, 129977- 130005.
doi: 10.1109/ACCESS.2021.3111444
|
4 |
OZPOLAT M , KAMPERT E , JENNINGS P A , et al. A grid-based coverage analysis of urban mmWave vehicular ad hoc networks[J]. IEEE Communications Letters, 2018, 22 (8): 1692- 1695.
doi: 10.1109/LCOMM.2018.2846562
|
5 |
TENG Y L, ZHANG P C, LIU Y Y, et al. PHY-Layer authentication with hardware impairments in UAV-aided communication systems[C]//Proc. of the International Conference on Networking and Network Applications, 2023: 18-22.
|
6 |
DONG C Z, JIANG F, CHEN S P, et al. Continuous authentication for UAV delivery systems under zero-trust security framework[C]//Proc. of the IEEE International Conference on Edge Computing and Communications, 2022: 123-132.
|
7 |
KARMAKAR R , KADDOUM G , AKHRIF O . A PUF and fuzzy extractor-based UAV-ground station and UAV-UAV authentication mechanism with intelligent adaptation of secure sessions[J]. IEEE Trans.on Mobile Computing, 2023, 23 (5): 3858- 3875.
|
8 |
SONI V, PRASAD B. A PUF based authentication schemes for UAV[C]//Proc. of the International Conference on Computer, Electronics & Electrical Engineering & their Applications, 2023.
|
9 |
郭锐. 基于国密算法的轻量级无人机网络认证密钥协商协议设计[D]. 西安: 西安电子科技大学, 2021.
|
|
GUO R. Design of lightweight authentication and key agreement protocol in UAV network based on Chinese commercial cryptography[D]. Xi'an: Xidian University, 2021.
|
10 |
DAS A K , WAZID M , YANNAM A R , et al. Provably secure ECC-based device access control and key agreement protocol for IoT environment[J]. IEEE Access, 2019, 7, 55382- 55397.
doi: 10.1109/ACCESS.2019.2912998
|
11 |
LU Y , ZHANG Q L , LI J G . A certificate-based AKA protocol secure against public key replacement attacks[J]. International Arab Journal of Information Technology, 2019, 16 (4): 754- 765.
|
12 |
KUMAR K K, RAMARAJ E, SRIKANTH B, et al. Role of MD5 message-digest algorithm for providing security to low-power devices[C]//Proc. of the 6th International Conference on Intelligent Computing and Control Systems, 2022: 352-358.
|
13 |
SHRIVASTAVA G, PATEL S. User-based adaptive search using elliptic curve cryptography and message digest for a secure cloud storage mechanism[C]//Proc. of the Global Conference on Information Technologies and Communications, 2023.
|
14 |
ZHOU C P, CHI Z Q, WANG Z D, et al. The secure transmission method of distribution network messages based on SM3 algorithm[C]//Proc. of the Power System and Green Energy Conference, 2022: 586-590.
|
15 |
SAKAMOTO J, NOBAYASHI D, TSUKAMOTO K, et al. Poster: implementation and performance evaluation of TCP/IP communication over private LoRa[C]//Proc. of the IEEE 30th International Conference on Network Protocols, 2022.
|
16 |
KUMAR A, PAUL P. A secure three-way handshake authentication process in IEEE 802. 11 i[C]//Proc. of the 2nd International Conference on Microelectronics, Computing & Communication Systems, 2019: 725-737.
|
17 |
NANDHINI V D, KOWSALYA M, RAGU P J, et al. Designing and validating an MD5 hash algorithm using the UVM veri-fication framework and checkers[C]//Proc. of the 14th Inter-national Conference on Computing Communication and Network-ing Technologies, 2023.
|
18 |
ZHENG X L, JIN J D. Research for the application and safety of MD5 algorithm in password authentication[C]//Proc. of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012: 2216-2219.
|
19 |
ZHONG L X, WAN W G, KONG D K. Javaweb login authentication based on improved MD5 algorithm[C]//Proc. of the International Conference on Audio, Language and Image Processing, 2016: 131-135.
|
20 |
WANG Z L, DU Y, WANG Q, et al. Research on software comparison of electric energy data acquire terminal based on MD5 algorithm[C]//Proc. of the Chinese Automation Congress, 2017: 845-849.
|
21 |
SALEM A, ATWOOD J W. Formal validation of the security properties of AMT's three-way handshake[C]//Proc. of the IEEE 36th Conference on Local Computer Networks, 2011: 227-230.
|
22 |
ZHANG H Y, ZHOU Q S, TAO Y. A kind of dynamic encryption algorithm and its application[C]//Proc. of the 2nd Pacific-Asia Conference on Circuits, Communications and System, 2010: 15-18.
|
23 |
RAM S B, ODELU V. Security analysis of a key exchange protocol under Dolev-Yao threat model using tamarin prover[C]//Proc. of the IEEE 12th Annual Computing and Communication Workshop and Conference, 2022: 667-672.
|
24 |
KOU G Y, WEI G H, QIN Y L. Research on key agreement protocol for static UAV networks[C]//Proc. of the IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference, 2022, 5: 668-673.
|
25 |
BACKES M, DURMUTH M. A cryptographically sound Dolev-Yao style security proof of an electronic payment system[C]//Proc. of the 18th IEEE Computer Security Foundations Workshop, 2005: 78-93.
|
26 |
RAHMAN K , KHAN M A , AFGHAH F , et al. An efficient authentication and access control protocol for securing UAV networks against anomaly-based Intrusion[J]. IEEE Access, 2024, 12, 62750- 62764.
doi: 10.1109/ACCESS.2024.3395494
|
27 |
张航. 基于QPSK调制的扩频通信技术及其FPGA实现[D]. 哈尔滨: 哈尔滨工业大学, 2020.
|
|
ZHANG H. Spread spectrum communication technology based on QPSK modulation and its FPGA implementation[D]. Harbin: Harbin Institute of Technology, 2020.
|
28 |
DENG X N, QIN Z Y, WU J L, et al. Lightweight authentication for resource-constrained devices in smart grid[C]//Proc. of the 8th International Conference on Signal and Image Processing, 2023: 619-623.
|
29 |
朱庆森, 宋翔飞, 何智旺. 基于PUF的无人机网络轻量级身份认证方案[J]. 软件导刊, 2024, 23 (6): 114- 120.
|
|
ZHU Q S , SONG X F , HE Z W . Lightweight identity authentication scheme of UAV network based on PUF[J]. Software Guide, 2024, 23 (6): 114- 120.
|
30 |
吴昊, 代飞, 张延年, 等. 一种基于密钥协商的UAV与用户的安全通信算法[J]. 电子信息对抗技术, 2024, 39 (2): 46- 52.
|
|
WU H , DAI F , ZHANG Y N , et al. A secure communication algorithm between UAV and user based on key agreement[J]. Electronic Information Countermeasure Technology, 2019, 39 (2): 46- 52.
|