Corrections to “A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET”
Author(s) -
Saeed Ullah Jan,
Irshad Ahmed Abbasi,
Fahad Algarni,
Adnan Shahid Khan
Publication year - 2022
Publication title -
ieee access
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.587
H-Index - 127
ISSN - 2169-3536
DOI - 10.1109/access.2022.3210727
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
In the above article [1] , the following corrections are necessary: Section II, preliminaries, subsection E Adversary Model – This model is based on [2] , suppose the proposed protocol is denoted by $\prod $ , entities involved are Mobile-Device (M), Drone (D), ground-control-station (GCS) and many instances are $\pi $ means an ith instance of $\prod $ . GCS has a confidential key s; suppose the drone has its identity IDD, nonce, $\text{N}_{\mathrm {D}}$ , and public key $\text{R}_{\mathrm {D}}$ ; mobile-device (M) has IDM, nonce $\text{N}_{\mathrm {M}}$ , publicly known key $\text{R}_{\mathrm {M}}$ . Drone (D) stores ( $\text{R}_{\mathrm {D}}$ , $\text{S}_{\mathrm {D}}$ , PKD, SK $_{\mathrm {D}}$ ), and Mobile-Device (M) stores ( $\text{R}_{\mathrm {M}}$ , $\text{S}_{\mathrm {M}}$ , PKM, SK $_{\mathrm {M}}$ ) parameters in their memories. Adversary interacts with $\prod $ to represent themselves as a malicious drone with D, M, or GCS in the following manner.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom