Using FANET, a Verifiably Secure ECC Based Authentication Scheme is used to secure IoD. PROJECT TITLE : A Verifiably Secure ECC Based Authentication Scheme for Securing IoD using FANET ABSTRACT: Secure Communication can even be maintained through unfavorable and unsafe channels if the appropriate precautions are taken, such as using perfect forward secrecy, cross-verification, and robust mutual authentication. The rapid development of wireless Communication and NetWorking technology that is assisted by drones has horrifying implications in a variety of domains, including the monitoring of wildlife, the inspection of infrastructure, the checking of sidewalks, and the surveillance of smart cities. However, when using Flying Ad Hoc Networks, it is still difficult for researchers to guarantee message integrity, non-repudiation, authenticity, and authorization for information transmission for these areas (FANETs). The existence of the FANET for drone technology is made more complicated by the dynamic changes in the topology of the network, making it easily vulnerable to numerous attacks from the adversary. To this day, in order to launch a drone in an Internet-of-Drones (IoD) environment, a controlled layered network architecture is required. This is necessary in order to ensure that only legitimate drones are able to collaborate securely with each other and with the ground control station (GCS), which is necessary for establishing the highest level of trust. Because an adversary may be able to steal data from an open network channel and use it for their nefarious purposes, even a seemingly insignificant security breach can result in significant difficulties for the protection of Communications. For a setting of this level of sensitivity, identification authentication and message authentication are both required components of the authentication process. As a result, in this research article, we have designed an Elliptic Curve Cryptographic (ECC)-based authentication scheme for IoD that makes use of FANET. This scheme is secure and can be verified. In addition to the less formal method of pragmatic illustration, a programming verification toolkit known as ProVerif2.03 and the Random Oracle Model (ROM) were utilized in order to provide a formal security proof for the scheme. In addition, the costs of storage, computation, and Communication were taken into account when writing the section of the article devoted to performance evaluation. It has been demonstrated that the work done in this article is both efficient and effective, and that it is suitable for practically implementing in an IoD environment. This conclusion was reached by comparing the proposed security mechanism with the most advanced schemes currently available. Did you like this research project? To get this research project Guidelines, Training and Code... Click Here facebook twitter google+ linkedin stumble pinterest A Better Equal Hierarchical Cluster-Based Routing Protocol for EH-WSNs to Improve Balanced Utilization of Harvested Energy Urban Scenario in VANET and a Novelty of Hypergraph Clustering Model (HGCM)