Crowd Monitoring System Based on Unmanned Aerial Vehicles: Secure Key Agreement Scheme
- 1. Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
- 1. Assistant Professor, Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
- 2. Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
Description
Abstract: Unmanned Arial Vehicles (UAVs) can be applied to survey or for monitoring huge crowd where conventional monitoring systems fail. Even though UAVs is proven to be effective way for monitoring and surveying there present a threat of data getting leaked when it is being transferred to the user’s device. To lessen these dangers a secure channel amid the user and the UAVs needs to be determined. There are multiple key agreement methods which is already present but they are either heavy authentication type or less secure to the attacks from the unscrupulous parties. In this paper, we provide an approach to mitigate such threats using a public key cryptographic method with a session-based authentication. The above-mentioned method is simulated using NS2 software and it’s efficiency will be recorded at the end.
Files
K998113111024.pdf
Files
(458.7 kB)
Name | Size | Download all |
---|---|---|
md5:8077ee75c5572105facbee7bc6bc00fb
|
458.7 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijitee.K9998.13111024
- EISSN
- 2278-3075
Dates
- Accepted
-
2024-10-15Manuscript received on 10 September 2024 | Revised Manuscript received on 12 September 2024 | Manuscript Accepted on 15 October 2024 | Manuscript published on 30 October 2024.
References
- Badshah et al., "USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment," in IEEE Transactions on Vehicular Technology, https://doi.org/10.1109/TVT.2024.3375758
- V. O. Nyangaresi et al., "Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges," 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, 2021, pp. 1-6, https://doi.org/10.1109/ICECET52533.2021.9698744
- S. Jangsher, A. Al-Dweik, Y. Iraqi, A. Pandey and J. -P. Giacalone, "Group Secret Key Generation Using Physical Layer Security for UAV Swarm Communications," in IEEE Transactions on Aerospace and Electronic Systems, vol. 59, no. 6, pp. 8550-8564, Dec. 2023, https://doi.org/10.1109/TAES.2023.3307092
- D. Wang, Y. Cao, K. -Y. Lam, Y. Hu and O. Kaiwartya, "Authentication and Key Agreement Based on Three Factors and PUF for UAV-Assisted Post-Disaster Emergency Communication," in IEEE Internet of Things Journal, vol. 11, no. 11, pp. 20457-20472, 1 June1, 2024, https://doi.org/10.1109/JIOT.2024.3371101
- P. Gope and B. Sikdar, "An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13621-13630, Nov. 2020, https://doi.org/10.1109/TVT.2020.3018778
- R. Ma, J. Cao, S. He, Y. Zhang, B. Niu and H. Li, "A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network," in IEEE Transactions on Network and Service Management, vol. 21, no. 2, pp. 2426-2444, April 2024, https://doi.org/10.1109/TNSM.2023.3341829
- E. Ghribi, T. T. Khoei, H. T. Gorji, P. Ranganathan and N. Kaabouch, "A Secure Blockchain-based Communication Approach for UAV Networks," 2020 IEEE International Conference on Electro Information Technology (EIT), Chicago, IL, USA, 2020, pp. 411-415, https://doi.org/10.1109/EIT48999.2020.9208314
- Chandran and K. Vipin, "A Robust PUF-Based Mutual Authentication and Key Agreement Protocol Using FPGA to Secure UAV Networks," 2023 IEEE Engineering Informatics, Melbourne, Australia, 2023, pp. 1-7, https://doi.org/10.1109/IEEECONF58110.2023.10520358
- Kumar, N., & Tomar, Dr. D. S. (2019). A Lightweight Authentication Method in Perception Layer of IoT Through Digital Watermarking. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 2937–2942). https://doi.org/10.35940/ijrte.c4793.098319
- S. U. Jan, I. A. Abbasi and F. Algarni, "A Key Agreement Scheme for IoD Deployment Civilian Drone," in IEEE Access, vol. 9, pp. 149311-149321, 2021, https://doi.org/10.1109/IEEECONF58110.2023.10520358
- J. Liu, L. Yuan, Z. -S. Feng, X. Chen and Z. -C. Hang, "A Lightweight Key Agreement Scheme for UAV Network," 2022 IEEE 8th International Conference on Computer and Communications (ICCC), Chengdu, China, 2022, pp. 731-735, https://doi.org/10.1109/ACCESS.2021.3124510
- Ayad and Y. Hammal, "An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments," 2021 International Conference on Networking and Advanced Systems (ICNAS), Annaba, Algeria, 2021, pp. 1-8, https://doi.org/10.1109/ICNAS53565.2021.9628966
- H. Dogan, "Protecting UAV-Networks: A Secure Lightweight Authentication and Key Agreement Scheme," 2023 7th International Conference on Cryptography, Security and Privacy (CSP), Tianjin, China, 2023, pp. 13-21, https://doi.org/10.1109/CSP58884.2023.00010
- Tappari, S., & Sridevi, K. (2019). Resource Optimized Security Coding in Light Weight Security Protocol. In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 10, pp. 2645–2651). https://doi.org/10.35940/ijitee.j9393.0881019
- M. Yahuza, M. Y. I. Idris, A. W. A. Wahab, T. Nandy, I. B. Ahmedy and R. Ramli, "An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network," in IEEE Access, vol. 9, pp. 31420-31440, 2021, https://doi.org/10.1109/ACCESS.2021.3060420
- Shaharkar, B. B., & Pandit, D. P. (2022). ML Based Authentication Scheme for Data Storage in Cloud Based IoT. In International Journal of Engineering and Advanced Technology (Vol. 11, Issue 6, pp. 123–127). https://doi.org/10.35940/ijeat.f3767.0811622
- Velani, J., & Patel, Dr. S. (2023). A Review: Fraud Prospects in Cryptocurrency Investment. In International Journal of Innovative Science and Modern Engineering (Vol. 11, Issue 6, pp. 1–4). https://doi.org/10.35940/ijisme.e4167.0611623
- Zubir, Dr. A. S. H. M., Awi, Dr. N. A., Ali, Dr. A., Mokhlis, Dr. S., & Sulong, Dr. F. (2020). Cryptocurrency Technology and Financial Reporting. In International Journal of Management and Humanities (Vol. 4, Issue 9, pp. 103–108). https://doi.org/10.35940/ijmh.i0898.054920
- Kaur, Dr. H., & Kaur, Prof. A. (2021). Cryptography in Cloud Computing. In Indian Journal of Cryptography and Network Security (Vol. 1, Issue 1, pp. 1–2). https://doi.org/10.54105/ijcns.a1402.051121
- Baig, M. A. (2021). An Efficient Cluster Based Routing Protocol (ECCRP) Technique Based on Weighted Clustering Algorithm for Different Topologies in Manets using Network Coding. In Indian Journal of Data Communication and Networking (Vol. 1, Issue 2, pp. 31–34). https://doi.org/10.54105/ijdcn.b5011.041221
- Raj, H., Duggal., A., M., A. K. S., Uppara, S., & S., S. M. (2020). Hand Motion Analysis using CNN. In International Journal of Soft Computing and Engineering (Vol. 9, Issue 6, pp. 26–30). https://doi.org/10.35940/ijsce.f3409.059620
- Saroj, S. K., Yadav, M., Jain, S., & Mishra, R. (2020). Performance Analysis of Q-Leach Algorithm in WSN. In International Journal of Inventive Engineering and Sciences (Vol. 5, Issue 10, pp. 1–4). https://doi.org/10.35940/ijies.i0977.0651020
- Murty, M. V. D. S. K., & Rajamani, Dr. L. (2023). Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets. In International Journal of Emerging Science and Engineering (Vol. 11, Issue 4, pp. 1–9). https://doi.org/10.35940/ijese.d2547.0311423
- Nixon, J. S., & Amenu, M. (2022). Investigating Security Issues and Preventive Mechanisms in Ipv6 Deployment. In International Journal of Advanced Engineering and Nano Technology (Vol. 9, Issue 2, pp. 1–20). https://doi.org/10.35940/ijaent.b0466.029222
- Rajeev, H., & Chakkaravarty, Dr. M. (2023). Prediction of Cybercrime using the Avinashak Algorithm. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 4, Issue 1, pp. 5–10). https://doi.org/10.54105/ijainn.a1078.124123