Author of the publication

Location Aware Clustering: Scalable Authentication Protocol for UAV Swarms.

, and . IEEE Netw. Lett., 3 (4): 177-180 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multihypothesis Sequential Testing for Illegitimate Access and Collision-Based Attack Detection in Wireless IoT Networks., , and . IEEE Internet Things J., 8 (14): 11705-11716 (2021)Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges., , and . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)Two-Factor Authentication for IoT With Location Information., , and . IEEE Internet Things J., 6 (2): 3335-3351 (2019)PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT., , , , , and . IEEE Internet Things J., 10 (10): 8547-8559 (May 2023)Mutual Authentication in IoT Systems Using Physical Unclonable Functions., , and . IEEE Internet Things J., 4 (5): 1327-1340 (2017)A Survey of Energy and Spectrum Harvesting Technologies and Protocols for Next Generation Wireless Networks., , , , and . IEEE Access, (2021)Optimal Pending Interest Table Size for ICN With Mobile Producers., , and . IEEE/ACM Trans. Netw., 28 (4): 1615-1628 (2020)Analytic models for the latency and steady-state throughput of TCP tahoe, Reno, and SACK., , and . IEEE/ACM Trans. Netw., 11 (6): 959-971 (2003)Modeling queueing and channel access delay in unsaturated IEEE 802.11 random access MAC based wireless networks., and . IEEE/ACM Trans. Netw., 16 (4): 878-891 (2008)Unified Detection of Attacks Involving Injection of False Control Commands and Measurements in Transmission Systems of Smart Grids., and . IEEE Trans. Smart Grid, 13 (2): 1598-1610 (2022)