Crowd Monitoring System Based on Unmanned Aerial Vehicles: Secure Key Agreement Scheme

Main Article Content

Dr. Sandhya. S
Jeshik S
Prajwal Gajanan Hegde

Abstract

Unmanned Arial Vehicles (UAVs) can be applied to survey or for monitoring huge crowd where conventional monitoring systems fail. Even though UAVs is proven to be effective way for monitoring and surveying there present a threat of data getting leaked when it is being transferred to the user’s device. To lessen these dangers a secure channel amid the user and the UAVs needs to be determined. There are multiple key agreement methods which is already present but they are either heavy authentication type or less secure to the attacks from the unscrupulous parties. In this paper, we provide an approach to mitigate such threats using a public key cryptographic method with a session-based authentication. The above-mentioned method is simulated using NS2 software and it’s efficiency will be recorded at the end.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Dr. Sandhya. S, Jeshik S, and Prajwal Gajanan Hegde , Trans., “Crowd Monitoring System Based on Unmanned Aerial Vehicles: Secure Key Agreement Scheme”, IJITEE, vol. 13, no. 11, pp. 28–32, Oct. 2024, doi: 10.35940/ijitee.K9998.13111024.
Section
Articles

How to Cite

[1]
Dr. Sandhya. S, Jeshik S, and Prajwal Gajanan Hegde , Trans., “Crowd Monitoring System Based on Unmanned Aerial Vehicles: Secure Key Agreement Scheme”, IJITEE, vol. 13, no. 11, pp. 28–32, Oct. 2024, doi: 10.35940/ijitee.K9998.13111024.
Share |

References

Badshah et al., "USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment," in IEEE Transactions on Vehicular Technology, https://doi.org/10.1109/TVT.2024.3375758

V. O. Nyangaresi et al., "Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges," 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, 2021, pp. 1-6, https://doi.org/10.1109/ICECET52533.2021.9698744

S. Jangsher, A. Al-Dweik, Y. Iraqi, A. Pandey and J. -P. Giacalone, "Group Secret Key Generation Using Physical Layer Security for UAV Swarm Communications," in IEEE Transactions on Aerospace and Electronic Systems, vol. 59, no. 6, pp. 8550-8564, Dec. 2023, https://doi.org/10.1109/TAES.2023.3307092

D. Wang, Y. Cao, K. -Y. Lam, Y. Hu and O. Kaiwartya, "Authentication and Key Agreement Based on Three Factors and PUF for UAV-Assisted Post-Disaster Emergency Communication," in IEEE Internet of Things Journal, vol. 11, no. 11, pp. 20457-20472, 1 June1, 2024, https://doi.org/10.1109/JIOT.2024.3371101

P. Gope and B. Sikdar, "An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13621-13630, Nov. 2020, https://doi.org/10.1109/TVT.2020.3018778

R. Ma, J. Cao, S. He, Y. Zhang, B. Niu and H. Li, "A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network," in IEEE Transactions on Network and Service Management, vol. 21, no. 2, pp. 2426-2444, April 2024, https://doi.org/10.1109/TNSM.2023.3341829

E. Ghribi, T. T. Khoei, H. T. Gorji, P. Ranganathan and N. Kaabouch, "A Secure Blockchain-based Communication Approach for UAV Networks," 2020 IEEE International Conference on Electro Information Technology (EIT), Chicago, IL, USA, 2020, pp. 411-415, https://doi.org/10.1109/EIT48999.2020.9208314

Chandran and K. Vipin, "A Robust PUF-Based Mutual Authentication and Key Agreement Protocol Using FPGA to Secure UAV Networks," 2023 IEEE Engineering Informatics, Melbourne, Australia, 2023, pp. 1-7, https://doi.org/10.1109/IEEECONF58110.2023.10520358

Kumar, N., & Tomar, Dr. D. S. (2019). A Lightweight Authentication Method in Perception Layer of IoT Through Digital Watermarking. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 2937–2942). https://doi.org/10.35940/ijrte.c4793.098319

S. U. Jan, I. A. Abbasi and F. Algarni, "A Key Agreement Scheme for IoD Deployment Civilian Drone," in IEEE Access, vol. 9, pp. 149311-149321, 2021, https://doi.org/10.1109/IEEECONF58110.2023.10520358

J. Liu, L. Yuan, Z. -S. Feng, X. Chen and Z. -C. Hang, "A Lightweight Key Agreement Scheme for UAV Network," 2022 IEEE 8th International Conference on Computer and Communications (ICCC), Chengdu, China, 2022, pp. 731-735, https://doi.org/10.1109/ACCESS.2021.3124510

Ayad and Y. Hammal, "An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments," 2021 International Conference on Networking and Advanced Systems (ICNAS), Annaba, Algeria, 2021, pp. 1-8, https://doi.org/10.1109/ICNAS53565.2021.9628966

H. Dogan, "Protecting UAV-Networks: A Secure Lightweight Authentication and Key Agreement Scheme," 2023 7th International Conference on Cryptography, Security and Privacy (CSP), Tianjin, China, 2023, pp. 13-21, https://doi.org/10.1109/CSP58884.2023.00010

Tappari, S., & Sridevi, K. (2019). Resource Optimized Security Coding in Light Weight Security Protocol. In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 10, pp. 2645–2651). https://doi.org/10.35940/ijitee.j9393.0881019

M. Yahuza, M. Y. I. Idris, A. W. A. Wahab, T. Nandy, I. B. Ahmedy and R. Ramli, "An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network," in IEEE Access, vol. 9, pp. 31420-31440, 2021, https://doi.org/10.1109/ACCESS.2021.3060420

Shaharkar, B. B., & Pandit, D. P. (2022). ML Based Authentication Scheme for Data Storage in Cloud Based IoT. In International Journal of Engineering and Advanced Technology (Vol. 11, Issue 6, pp. 123–127). https://doi.org/10.35940/ijeat.f3767.0811622

Velani, J., & Patel, Dr. S. (2023). A Review: Fraud Prospects in Cryptocurrency Investment. In International Journal of Innovative Science and Modern Engineering (Vol. 11, Issue 6, pp. 1–4). https://doi.org/10.35940/ijisme.e4167.0611623

Zubir, Dr. A. S. H. M., Awi, Dr. N. A., Ali, Dr. A., Mokhlis, Dr. S., & Sulong, Dr. F. (2020). Cryptocurrency Technology and Financial Reporting. In International Journal of Management and Humanities (Vol. 4, Issue 9, pp. 103–108). https://doi.org/10.35940/ijmh.i0898.054920

Kaur, Dr. H., & Kaur, Prof. A. (2021). Cryptography in Cloud Computing. In Indian Journal of Cryptography and Network Security (Vol. 1, Issue 1, pp. 1–2). https://doi.org/10.54105/ijcns.a1402.051121

Baig, M. A. (2021). An Efficient Cluster Based Routing Protocol (ECCRP) Technique Based on Weighted Clustering Algorithm for Different Topologies in Manets using Network Coding. In Indian Journal of Data Communication and Networking (Vol. 1, Issue 2, pp. 31–34). https://doi.org/10.54105/ijdcn.b5011.041221

Raj, H., Duggal., A., M., A. K. S., Uppara, S., & S., S. M. (2020). Hand Motion Analysis using CNN. In International Journal of Soft Computing and Engineering (Vol. 9, Issue 6, pp. 26–30). https://doi.org/10.35940/ijsce.f3409.059620

Saroj, S. K., Yadav, M., Jain, S., & Mishra, R. (2020). Performance Analysis of Q-Leach Algorithm in WSN. In International Journal of Inventive Engineering and Sciences (Vol. 5, Issue 10, pp. 1–4). https://doi.org/10.35940/ijies.i0977.0651020

Murty, M. V. D. S. K., & Rajamani, Dr. L. (2023). Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets. In International Journal of Emerging Science and Engineering (Vol. 11, Issue 4, pp. 1–9). https://doi.org/10.35940/ijese.d2547.0311423

Nixon, J. S., & Amenu, M. (2022). Investigating Security Issues and Preventive Mechanisms in Ipv6 Deployment. In International Journal of Advanced Engineering and Nano Technology (Vol. 9, Issue 2, pp. 1–20). https://doi.org/10.35940/ijaent.b0466.029222

Rajeev, H., & Chakkaravarty, Dr. M. (2023). Prediction of Cybercrime using the Avinashak Algorithm. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 4, Issue 1, pp. 5–10). https://doi.org/10.54105/ijainn.a1078.124123

Most read articles by the same author(s)

<< < 3 4 5 6 7 8 9 10 > >>