Yassine Mekdad, Ahmet Aris, Abbas Acar, M. Conti, R. Lazzeretti, A. E. Fergougui, Selcuk Uluagac
{"title":"A comprehensive security and performance assessment of UAV authentication schemes","authors":"Yassine Mekdad, Ahmet Aris, Abbas Acar, M. Conti, R. Lazzeretti, A. E. Fergougui, Selcuk Uluagac","doi":"10.1002/spy2.338","DOIUrl":"https://doi.org/10.1002/spy2.338","url":null,"abstract":"In the past few years, unmanned aerial vehicles (UAVs) have significantly gained attention and popularity from industry, government, and academia. With their rapid development and deployment into the civilian airspace, UAVs play an important role in different applications, including goods delivery, search‐and‐rescue, and traffic monitoring. Therefore, providing secure communication through authentication models for UAVs is necessary for a successful and reliable flight mission. To satisfy such requirements, numerous authentication mechanisms have been proposed in the literature. However, the literature lacks a comprehensive study evaluating the security and performance of these solutions. In this article, we analyze the security and performance of 27 recent UAV authentication works by considering ten different key metrics. First, in the performance analysis, we show that the majority of UAV authentication schemes are lightweight in their communication cost. However, the storage overhead or the energy consumption is not reported by many authentication studies. Then, we reveal in the security analysis the widely employed formal models (i.e., abstract description of an authentication protocol through a mathematical model), while most of the studies lack coverage of many attacks that can target UAV systems. Afterwards, we highlight the challenges that need to be addressed in order to design and implement secure and reliable UAV authentication schemes. Finally, we summarize the lessons learned on the authentication strategies for UAVs to motivate promising direction for further research.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48708424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, S. Tanwar, Ravi Sharma, Amit Verma
{"title":"Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions","authors":"Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, S. Tanwar, Ravi Sharma, Amit Verma","doi":"10.1002/spy2.337","DOIUrl":"https://doi.org/10.1002/spy2.337","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41493150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocation","authors":"Md. Azharul Islam, S. Madria","doi":"10.1002/spy2.336","DOIUrl":"https://doi.org/10.1002/spy2.336","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42690533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, S. S. Gill
{"title":"A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks","authors":"Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, S. S. Gill","doi":"10.1002/spy2.335","DOIUrl":"https://doi.org/10.1002/spy2.335","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48091623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal key pre‐distribution schemes from affine resolvable and partially affine resolvable designs","authors":"Shyam Saurabh, K. Sinha","doi":"10.1002/spy2.334","DOIUrl":"https://doi.org/10.1002/spy2.334","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44578636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy preserving vaccinating‐ and testing‐pass for the European Union","authors":"Dominik Schrahe, Thomas Städter","doi":"10.1002/spy2.332","DOIUrl":"https://doi.org/10.1002/spy2.332","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41734211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P‐DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities","authors":"Sharmila B S, Rohini Nagapadma","doi":"10.1002/spy2.330","DOIUrl":"https://doi.org/10.1002/spy2.330","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43837002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy preserving content distribution framework for multidistributor DRM systems","authors":"Ankita Mishra, M. Obaidat, D. Mishra","doi":"10.1002/spy2.327","DOIUrl":"https://doi.org/10.1002/spy2.327","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43612510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Indu Kumari, P. Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, D. Rawat
{"title":"RFPM: A RSU‐aided framework for pseudonym management to preserve location privacy in IoV","authors":"Indu Kumari, P. Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, D. Rawat","doi":"10.1002/spy2.329","DOIUrl":"https://doi.org/10.1002/spy2.329","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45178379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}