Loading…
Secure communication using multilevel authentication strategy in Internet of Drones
Summary The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence...
Saved in:
Published in: | Concurrency and computation 2023-05, Vol.35 (12), p.n/a |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43 |
---|---|
cites | cdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43 |
container_end_page | n/a |
container_issue | 12 |
container_start_page | |
container_title | Concurrency and computation |
container_volume | 35 |
creator | Perumalla, Subhadra Chatterjee, Santanu Siva Kumar, A.P. |
description | Summary
The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively. |
doi_str_mv | 10.1002/cpe.7667 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2804863257</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2804863257</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</originalsourceid><addsrcrecordid>eNp10M9LwzAUB_AgCs4p-CcEvHjpTJqkTY8ypw4GCtNzeMaX2dGmM0mV_fd2Tr15yoN8eD--hJxzNuGM5Vd2g5OyKMoDMuJK5BkrhDz8q_PimJzEuGaMcyb4iCyXaPuA1HZt2_vaQqo7T_tY-xVt-ybVDX5gQ6FPb-jT739MARKutrT2dO4TBo-Jdo7ehM5jPCVHDpqIZz_vmDzfzp6m99ni4W4-vV5kNq9EmbnKSamGLQqU1iEoqUtpNavghStwmDNWaA3g4BWU4DvNlIBKS61AgRRjcrHvuwnde48xmXXXBz-MNLlmUhciV-WgLvfKhi7GgM5sQt1C2BrOzC4yM0RmdpENNNvTz-Hs7b_OTB9n3_4LKJltZg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2804863257</pqid></control><display><type>article</type><title>Secure communication using multilevel authentication strategy in Internet of Drones</title><source>Wiley-Blackwell Read & Publish Collection</source><creator>Perumalla, Subhadra ; Chatterjee, Santanu ; Siva Kumar, A.P.</creator><creatorcontrib>Perumalla, Subhadra ; Chatterjee, Santanu ; Siva Kumar, A.P.</creatorcontrib><description>Summary
The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively.</description><identifier>ISSN: 1532-0626</identifier><identifier>EISSN: 1532-0634</identifier><identifier>DOI: 10.1002/cpe.7667</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley & Sons, Inc</publisher><subject>Access control ; Alliances ; Authentication ; Communication ; Cybersecurity ; Drone aircraft ; Drone vehicles ; Drones ; Electronic devices ; fly zone ; Internet of Things ; IoD ; Registration ; security ; Unmanned aerial vehicles ; unmanned aerial vehicles (UAV)</subject><ispartof>Concurrency and computation, 2023-05, Vol.35 (12), p.n/a</ispartof><rights>2023 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</citedby><cites>FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</cites><orcidid>0000-0002-9880-1943</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Perumalla, Subhadra</creatorcontrib><creatorcontrib>Chatterjee, Santanu</creatorcontrib><creatorcontrib> Siva Kumar, A.P.</creatorcontrib><title>Secure communication using multilevel authentication strategy in Internet of Drones</title><title>Concurrency and computation</title><description>Summary
The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively.</description><subject>Access control</subject><subject>Alliances</subject><subject>Authentication</subject><subject>Communication</subject><subject>Cybersecurity</subject><subject>Drone aircraft</subject><subject>Drone vehicles</subject><subject>Drones</subject><subject>Electronic devices</subject><subject>fly zone</subject><subject>Internet of Things</subject><subject>IoD</subject><subject>Registration</subject><subject>security</subject><subject>Unmanned aerial vehicles</subject><subject>unmanned aerial vehicles (UAV)</subject><issn>1532-0626</issn><issn>1532-0634</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNp10M9LwzAUB_AgCs4p-CcEvHjpTJqkTY8ypw4GCtNzeMaX2dGmM0mV_fd2Tr15yoN8eD--hJxzNuGM5Vd2g5OyKMoDMuJK5BkrhDz8q_PimJzEuGaMcyb4iCyXaPuA1HZt2_vaQqo7T_tY-xVt-ybVDX5gQ6FPb-jT739MARKutrT2dO4TBo-Jdo7ehM5jPCVHDpqIZz_vmDzfzp6m99ni4W4-vV5kNq9EmbnKSamGLQqU1iEoqUtpNavghStwmDNWaA3g4BWU4DvNlIBKS61AgRRjcrHvuwnde48xmXXXBz-MNLlmUhciV-WgLvfKhi7GgM5sQt1C2BrOzC4yM0RmdpENNNvTz-Hs7b_OTB9n3_4LKJltZg</recordid><startdate>20230530</startdate><enddate>20230530</enddate><creator>Perumalla, Subhadra</creator><creator>Chatterjee, Santanu</creator><creator> Siva Kumar, A.P.</creator><general>John Wiley & Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-9880-1943</orcidid></search><sort><creationdate>20230530</creationdate><title>Secure communication using multilevel authentication strategy in Internet of Drones</title><author>Perumalla, Subhadra ; Chatterjee, Santanu ; Siva Kumar, A.P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Alliances</topic><topic>Authentication</topic><topic>Communication</topic><topic>Cybersecurity</topic><topic>Drone aircraft</topic><topic>Drone vehicles</topic><topic>Drones</topic><topic>Electronic devices</topic><topic>fly zone</topic><topic>Internet of Things</topic><topic>IoD</topic><topic>Registration</topic><topic>security</topic><topic>Unmanned aerial vehicles</topic><topic>unmanned aerial vehicles (UAV)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Perumalla, Subhadra</creatorcontrib><creatorcontrib>Chatterjee, Santanu</creatorcontrib><creatorcontrib> Siva Kumar, A.P.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Concurrency and computation</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Perumalla, Subhadra</au><au>Chatterjee, Santanu</au><au> Siva Kumar, A.P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure communication using multilevel authentication strategy in Internet of Drones</atitle><jtitle>Concurrency and computation</jtitle><date>2023-05-30</date><risdate>2023</risdate><volume>35</volume><issue>12</issue><epage>n/a</epage><issn>1532-0626</issn><eissn>1532-0634</eissn><abstract>Summary
The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively.</abstract><cop>Hoboken, USA</cop><pub>John Wiley & Sons, Inc</pub><doi>10.1002/cpe.7667</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-9880-1943</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1532-0626 |
ispartof | Concurrency and computation, 2023-05, Vol.35 (12), p.n/a |
issn | 1532-0626 1532-0634 |
language | eng |
recordid | cdi_proquest_journals_2804863257 |
source | Wiley-Blackwell Read & Publish Collection |
subjects | Access control Alliances Authentication Communication Cybersecurity Drone aircraft Drone vehicles Drones Electronic devices fly zone Internet of Things IoD Registration security Unmanned aerial vehicles unmanned aerial vehicles (UAV) |
title | Secure communication using multilevel authentication strategy in Internet of Drones |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T00%3A21%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20communication%20using%20multilevel%20authentication%20strategy%20in%20Internet%20of%20Drones&rft.jtitle=Concurrency%20and%20computation&rft.au=Perumalla,%20Subhadra&rft.date=2023-05-30&rft.volume=35&rft.issue=12&rft.epage=n/a&rft.issn=1532-0626&rft.eissn=1532-0634&rft_id=info:doi/10.1002/cpe.7667&rft_dat=%3Cproquest_cross%3E2804863257%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2804863257&rft_id=info:pmid/&rfr_iscdi=true |