A Verifiably Secure ECC Based Authentication Scheme for Securing IoD using FANET


Secure Communication can even be maintained through unfavorable and unsafe channels if the appropriate precautions are taken, such as using perfect forward secrecy, cross-verification, and robust mutual authentication. The rapid development of wireless Communication and NetWorking technology that is assisted by drones has horrifying implications in a variety of domains, including the monitoring of wildlife, the inspection of infrastructure, the checking of sidewalks, and the surveillance of smart cities. However, when using Flying Ad Hoc Networks, it is still difficult for researchers to guarantee message integrity, non-repudiation, authenticity, and authorization for information transmission for these areas (FANETs). The existence of the FANET for drone technology is made more complicated by the dynamic changes in the topology of the network, making it easily vulnerable to numerous attacks from the adversary. To this day, in order to launch a drone in an Internet-of-Drones (IoD) environment, a controlled layered network architecture is required. This is necessary in order to ensure that only legitimate drones are able to collaborate securely with each other and with the ground control station (GCS), which is necessary for establishing the highest level of trust. Because an adversary may be able to steal data from an open network channel and use it for their nefarious purposes, even a seemingly insignificant security breach can result in significant difficulties for the protection of Communications. For a setting of this level of sensitivity, identification authentication and message authentication are both required components of the authentication process. As a result, in this research article, we have designed an Elliptic Curve Cryptographic (ECC)-based authentication scheme for IoD that makes use of FANET. This scheme is secure and can be verified. In addition to the less formal method of pragmatic illustration, a programming verification toolkit known as ProVerif2.03 and the Random Oracle Model (ROM) were utilized in order to provide a formal security proof for the scheme. In addition, the costs of storage, computation, and Communication were taken into account when writing the section of the article devoted to performance evaluation. It has been demonstrated that the work done in this article is both efficient and effective, and that it is suitable for practically implementing in an IoD environment. This conclusion was reached by comparing the proposed security mechanism with the most advanced schemes currently available.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Smartphone based Indoor Path Estimation and Localization without Human Intervention ABSTRACT: Many different kinds of indoor positioning systems have been developed as a result of the growing market interest in
PROJECT TITLE : Robust Fuzzy Learning for Partially Overlapping Channels Allocation in UAV Communication Networks ABSTRACT: The emerging cellular-enabled unmanned aerial vehicle (UAV) communication paradigm poses significant challenges
PROJECT TITLE : Prediction of Traffic Flow via Connnected Vehicles ABSTRACT: We propose a framework for short-term traffic flow prediction (STP) so that transportation authorities can take early actions to control flow and prevent
PROJECT TITLE : Passenger Demand Prediction with Cellular Footprints ABSTRACT: An accurate forecast of the demand for passengers across the entire city enables providers of online car-hailing services to more efficiently schedule
PROJECT TITLE : NCF: A Neural Context Fusion Approach to Raw Mobility Annotation ABSTRACT: Improving business intelligence in mobile environments requires a thorough comprehension of human mobility patterns on a point-of-interest

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry