CUI Lahore Repository

Design and Development of a Trust-based secure Authentication scheme for Internet of Drones (IoD) Networks

Show simple item record

dc.contributor.author Fayyaz, Fatima
dc.date.accessioned 2024-05-27T15:43:08Z
dc.date.available 2024-05-27T15:43:08Z
dc.date.issued 2024-05-27
dc.identifier.uri http://repository.cuilahore.edu.pk/xmlui/handle/123456789/4155
dc.description.abstract Drone advancement is prevailing in the latest trends in various sectors. The concept and deployment of commercial drones can provide services in different fields of life. They can be very beneficial in terms of serving industrial, agricultural, construction, packet delivery, videography, and health care providing services in managing, securing, and broadcasting operations. Diversification of networks and dynamic conditions due to heterogeneousness in types of drones and their ownership, a trust factor between these drones is a very critical issue in their intercommunication. Attacker can easily capture the data from a un-secured public channel and can misuse it against participants. Internet of Drone network protection is very important and challenging, as it ensures message integrity, message authenticity and secure authorization access. The lack of this trust factor has just left the Internet of Drones (IoD) domain exposed to security and privacy threats. The drone nodes can only establish a connection to other drones if they are considered legitimate or corporate (friendly) nodes, the rest of them will not be able to make any connection as they are non-corporate (adversary) or unauthorized. The proposed trust factor is based on a security model that establishes trust by continuous authentication and monitoring access attempts between nodes located in the corporate cluster for data delivery. Hence, a trust-based network authenticated framework is much needed for overcoming these security issues. For achieving secure data decimation and intercommunication it is highly important to create a trust-based, threat-free, environment for IOD networks and to provide the strength to security framework in vulnerable authentication schemes against different type of attacks i.e.; replay and impersonation attack, this paper analyzes the research gaps and proposes a new framework for authentication schemes. Considering the previous proposed factors and techniques, this research focuses on establishing a new architecture for providing secure authentication among Internet of Drones (IoD) environment. This paper presents the more secure framework by mutual authentication and key exchange protocol in IoD with continuous chained Hash Function. System generates temporary symmetric keys to establish connection between two nodes, hence devices can mutually authenticate and establishes connection in an untraceable manner. For the verification of sender identity, chained-hashed way is presented. Session keys between devices are updated after every transaction to maintain secrecy. The evaluation of cost and effectiveness of the proposed method with previous protocol are computed. The outcomes demonstrated that our techniques are more secure than previous frameworks. en_US
dc.publisher Computer Science COMSATS University Islamabad Lahore Campus en_US
dc.relation.ispartofseries CIIT/FA21-RCS-004/LHR;8674
dc.subject Drone advancement is prevailing in the latest trends in various sectors. The concept and deployment of commercial drones can provide services in different fields of life. They can be very beneficial in terms of serving industrial, agricultural en_US
dc.title Design and Development of a Trust-based secure Authentication scheme for Internet of Drones (IoD) Networks en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • Thesis - MS / PhD
    This collection containts the Ms/PhD thesis of the studetns of Department of Computer Science

Show simple item record

Search DSpace


Advanced Search

Browse

My Account