z-logo
open-access-imgOpen Access
Corrections to “A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET”
Author(s) -
Saeed Ullah Jan,
Irshad Ahmed Abbasi,
Fahad Algarni,
Adnan Shahid Khan
Publication year - 2022
Publication title -
ieee access
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.587
H-Index - 127
ISSN - 2169-3536
DOI - 10.1109/access.2022.3210727
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
In the above article [1], the following corrections are necessary: Section II, preliminaries, subsection E Adversary Model – This model is based on [2], suppose the proposed protocol is denoted by $\prod $ , entities involved are Mobile-Device (M), Drone (D), ground-control-station (GCS) and many instances are $\pi $ means an ith instance of $\prod $ . GCS has a confidential key s; suppose the drone has its identity IDD, nonce, $\text{N}_{\mathrm {D}}$ , and public key $\text{R}_{\mathrm {D}}$ ; mobile-device (M) has IDM, nonce $\text{N}_{\mathrm {M}}$ , publicly known key $\text{R}_{\mathrm {M}}$ . Drone (D) stores ( $\text{R}_{\mathrm {D}}$ , $\text{S}_{\mathrm {D}}$ , PKD, SK $_{\mathrm {D}}$ ), and Mobile-Device (M) stores ( $\text{R}_{\mathrm {M}}$ , $\text{S}_{\mathrm {M}}$ , PKM, SK $_{\mathrm {M}}$ ) parameters in their memories. Adversary interacts with $\prod $ to represent themselves as a malicious drone with D, M, or GCS in the following manner.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here