Corrections to “A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET”

In the above article <xref ref-type="bibr" rid="ref1">[1]</xref>, the following corrections are necessary: Section II, preliminaries, subsection E Adversary Model &#x2013; This model is based on <xref ref-type="bibr" rid="ref2">[2]</xr...

Cijeli opis

Bibliografski detalji
Glavni autori: Saeed Ullah Jan, Irshad Ahmed Abbasi, Fahad Algarni, Adnan Shahid Khan
Format: Članak
Jezik:English
Izdano: IEEE 2022-01-01
Serija:IEEE Access
Online pristup:https://ieeexplore.ieee.org/document/9916121/
Opis
Sažetak:In the above article <xref ref-type="bibr" rid="ref1">[1]</xref>, the following corrections are necessary: Section II, preliminaries, subsection E Adversary Model &#x2013; This model is based on <xref ref-type="bibr" rid="ref2">[2]</xref>, suppose the proposed protocol is denoted by <inline-formula> <tex-math notation="LaTeX">$\prod $ </tex-math></inline-formula>, entities involved are Mobile-Device (M), Drone (D), ground-control-station (GCS) and many instances are <inline-formula> <tex-math notation="LaTeX">$\pi $ </tex-math></inline-formula> means an ith instance of <inline-formula> <tex-math notation="LaTeX">$\prod $ </tex-math></inline-formula>. GCS has a confidential key s; suppose the drone has its identity ID<sub>D</sub>, nonce, <inline-formula> <tex-math notation="LaTeX">$\text{N}_{\mathrm {D}}$ </tex-math></inline-formula>, and public key <inline-formula> <tex-math notation="LaTeX">$\text{R}_{\mathrm {D}}$ </tex-math></inline-formula>; mobile-device (M) has ID<sub>M</sub>, nonce <inline-formula> <tex-math notation="LaTeX">$\text{N}_{\mathrm {M}}$ </tex-math></inline-formula>, publicly known key <inline-formula> <tex-math notation="LaTeX">$\text{R}_{\mathrm {M}}$ </tex-math></inline-formula>. Drone (D) stores (<inline-formula> <tex-math notation="LaTeX">$\text{R}_{\mathrm {D}}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$\text{S}_{\mathrm {D}}$ </tex-math></inline-formula>, PK<sub>D</sub>, SK<inline-formula> <tex-math notation="LaTeX">$_{\mathrm {D}}$ </tex-math></inline-formula>), and Mobile-Device (M) stores (<inline-formula> <tex-math notation="LaTeX">$\text{R}_{\mathrm {M}}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$\text{S}_{\mathrm {M}}$ </tex-math></inline-formula>, PK<sub>M</sub>, SK<inline-formula> <tex-math notation="LaTeX">$_{\mathrm {M}}$ </tex-math></inline-formula>) parameters in their memories. Adversary interacts with <inline-formula> <tex-math notation="LaTeX">$\prod $ </tex-math></inline-formula> to represent themselves as a malicious drone with D, M, or GCS in the following manner.
ISSN:2169-3536