dc.description.abstract |
Drone advancement is prevailing in the latest trends in various sectors. The concept and deployment of commercial drones can provide services in different fields of life. They can be very beneficial in terms of serving industrial, agricultural, construction, packet delivery, videography, and health care providing services in managing, securing, and broadcasting operations. Diversification of networks and dynamic conditions due to heterogeneousness in types of drones and their ownership, a trust factor between these drones is a very critical issue in their intercommunication. Attacker can easily capture the data from a un-secured public channel and can misuse it against participants. Internet of Drone network protection is very important and challenging, as it ensures message integrity, message authenticity and secure authorization access.
The lack of this trust factor has just left the Internet of Drones (IoD) domain exposed to security and privacy threats. The drone nodes can only establish a connection to other drones if they are considered legitimate or corporate (friendly) nodes, the rest of them will not be able to make any connection as they are non-corporate (adversary) or unauthorized. The proposed trust factor is based on a security model that establishes trust by continuous authentication and monitoring access attempts between nodes located in the corporate cluster for data delivery. Hence, a trust-based network authenticated framework is much needed for overcoming these security issues. For achieving secure data decimation and intercommunication it is highly important to create a trust-based, threat-free, environment for IOD networks and to provide the strength to security framework in vulnerable authentication schemes against different type of attacks i.e.; replay and impersonation attack, this paper analyzes the research gaps and proposes a new framework for authentication schemes.
Considering the previous proposed factors and techniques, this research focuses on establishing a new architecture for providing secure authentication among Internet of Drones (IoD) environment. This paper presents the more secure framework by mutual authentication and key exchange protocol in IoD with continuous chained Hash Function. System generates temporary symmetric keys to establish connection between two nodes, hence devices can mutually authenticate and establishes connection in an untraceable manner. For the verification of sender identity, chained-hashed way is presented. Session keys between devices are updated after every transaction to maintain secrecy. The evaluation of cost and effectiveness of the proposed method with previous protocol are computed. The outcomes demonstrated that our techniques are more secure than previous frameworks. |
en_US |