Loading…

Secure communication using multilevel authentication strategy in Internet of Drones

Summary The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence...

Full description

Saved in:
Bibliographic Details
Published in:Concurrency and computation 2023-05, Vol.35 (12), p.n/a
Main Authors: Perumalla, Subhadra, Chatterjee, Santanu,  Siva Kumar, A.P.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43
cites cdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43
container_end_page n/a
container_issue 12
container_start_page
container_title Concurrency and computation
container_volume 35
creator Perumalla, Subhadra
Chatterjee, Santanu
 Siva Kumar, A.P.
description Summary The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively.
doi_str_mv 10.1002/cpe.7667
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2804863257</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2804863257</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</originalsourceid><addsrcrecordid>eNp10M9LwzAUB_AgCs4p-CcEvHjpTJqkTY8ypw4GCtNzeMaX2dGmM0mV_fd2Tr15yoN8eD--hJxzNuGM5Vd2g5OyKMoDMuJK5BkrhDz8q_PimJzEuGaMcyb4iCyXaPuA1HZt2_vaQqo7T_tY-xVt-ybVDX5gQ6FPb-jT739MARKutrT2dO4TBo-Jdo7ehM5jPCVHDpqIZz_vmDzfzp6m99ni4W4-vV5kNq9EmbnKSamGLQqU1iEoqUtpNavghStwmDNWaA3g4BWU4DvNlIBKS61AgRRjcrHvuwnde48xmXXXBz-MNLlmUhciV-WgLvfKhi7GgM5sQt1C2BrOzC4yM0RmdpENNNvTz-Hs7b_OTB9n3_4LKJltZg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2804863257</pqid></control><display><type>article</type><title>Secure communication using multilevel authentication strategy in Internet of Drones</title><source>Wiley-Blackwell Read &amp; Publish Collection</source><creator>Perumalla, Subhadra ; Chatterjee, Santanu ;  Siva Kumar, A.P.</creator><creatorcontrib>Perumalla, Subhadra ; Chatterjee, Santanu ;  Siva Kumar, A.P.</creatorcontrib><description>Summary The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively.</description><identifier>ISSN: 1532-0626</identifier><identifier>EISSN: 1532-0634</identifier><identifier>DOI: 10.1002/cpe.7667</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley &amp; Sons, Inc</publisher><subject>Access control ; Alliances ; Authentication ; Communication ; Cybersecurity ; Drone aircraft ; Drone vehicles ; Drones ; Electronic devices ; fly zone ; Internet of Things ; IoD ; Registration ; security ; Unmanned aerial vehicles ; unmanned aerial vehicles (UAV)</subject><ispartof>Concurrency and computation, 2023-05, Vol.35 (12), p.n/a</ispartof><rights>2023 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</citedby><cites>FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</cites><orcidid>0000-0002-9880-1943</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Perumalla, Subhadra</creatorcontrib><creatorcontrib>Chatterjee, Santanu</creatorcontrib><creatorcontrib> Siva Kumar, A.P.</creatorcontrib><title>Secure communication using multilevel authentication strategy in Internet of Drones</title><title>Concurrency and computation</title><description>Summary The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively.</description><subject>Access control</subject><subject>Alliances</subject><subject>Authentication</subject><subject>Communication</subject><subject>Cybersecurity</subject><subject>Drone aircraft</subject><subject>Drone vehicles</subject><subject>Drones</subject><subject>Electronic devices</subject><subject>fly zone</subject><subject>Internet of Things</subject><subject>IoD</subject><subject>Registration</subject><subject>security</subject><subject>Unmanned aerial vehicles</subject><subject>unmanned aerial vehicles (UAV)</subject><issn>1532-0626</issn><issn>1532-0634</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNp10M9LwzAUB_AgCs4p-CcEvHjpTJqkTY8ypw4GCtNzeMaX2dGmM0mV_fd2Tr15yoN8eD--hJxzNuGM5Vd2g5OyKMoDMuJK5BkrhDz8q_PimJzEuGaMcyb4iCyXaPuA1HZt2_vaQqo7T_tY-xVt-ybVDX5gQ6FPb-jT739MARKutrT2dO4TBo-Jdo7ehM5jPCVHDpqIZz_vmDzfzp6m99ni4W4-vV5kNq9EmbnKSamGLQqU1iEoqUtpNavghStwmDNWaA3g4BWU4DvNlIBKS61AgRRjcrHvuwnde48xmXXXBz-MNLlmUhciV-WgLvfKhi7GgM5sQt1C2BrOzC4yM0RmdpENNNvTz-Hs7b_OTB9n3_4LKJltZg</recordid><startdate>20230530</startdate><enddate>20230530</enddate><creator>Perumalla, Subhadra</creator><creator>Chatterjee, Santanu</creator><creator> Siva Kumar, A.P.</creator><general>John Wiley &amp; Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-9880-1943</orcidid></search><sort><creationdate>20230530</creationdate><title>Secure communication using multilevel authentication strategy in Internet of Drones</title><author>Perumalla, Subhadra ; Chatterjee, Santanu ;  Siva Kumar, A.P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Alliances</topic><topic>Authentication</topic><topic>Communication</topic><topic>Cybersecurity</topic><topic>Drone aircraft</topic><topic>Drone vehicles</topic><topic>Drones</topic><topic>Electronic devices</topic><topic>fly zone</topic><topic>Internet of Things</topic><topic>IoD</topic><topic>Registration</topic><topic>security</topic><topic>Unmanned aerial vehicles</topic><topic>unmanned aerial vehicles (UAV)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Perumalla, Subhadra</creatorcontrib><creatorcontrib>Chatterjee, Santanu</creatorcontrib><creatorcontrib> Siva Kumar, A.P.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Concurrency and computation</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Perumalla, Subhadra</au><au>Chatterjee, Santanu</au><au> Siva Kumar, A.P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure communication using multilevel authentication strategy in Internet of Drones</atitle><jtitle>Concurrency and computation</jtitle><date>2023-05-30</date><risdate>2023</risdate><volume>35</volume><issue>12</issue><epage>n/a</epage><issn>1532-0626</issn><eissn>1532-0634</eissn><abstract>Summary The Internet of Drones (IoD) is a layered network or platform that controls and coordinates the drones. The unmanned aerial vehicles also called as drones are objects that utilized in Internet of Things (IoT) smart devices. The security is the major problem in the architecture for IoD. Hence, a multilevel authentication method is devised in this article to enable secure communication in IoD. The analysis of security is depending on four stages, such as pre‐deployment, user registration, login phase, and authentication phase. The drones are registered in the IoD infrastructure in the pre‐deployment phase. Then, the users registration with the drone is done in user registration phase, which is executed to register the users with the drone for accessing the information in real‐time via the user. Then, the user communicates with the server is done in the login phase, and at last, the authentication of drones, servers, and the users are done in authentication phase to offer secured communication. The devised approach attains the maximum performance with a delay, throughput, and packet loss of 0.099 s, 62.855 bps, and 2.52012 s, respectively.</abstract><cop>Hoboken, USA</cop><pub>John Wiley &amp; Sons, Inc</pub><doi>10.1002/cpe.7667</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-9880-1943</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1532-0626
ispartof Concurrency and computation, 2023-05, Vol.35 (12), p.n/a
issn 1532-0626
1532-0634
language eng
recordid cdi_proquest_journals_2804863257
source Wiley-Blackwell Read & Publish Collection
subjects Access control
Alliances
Authentication
Communication
Cybersecurity
Drone aircraft
Drone vehicles
Drones
Electronic devices
fly zone
Internet of Things
IoD
Registration
security
Unmanned aerial vehicles
unmanned aerial vehicles (UAV)
title Secure communication using multilevel authentication strategy in Internet of Drones
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T00%3A21%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20communication%20using%20multilevel%20authentication%20strategy%20in%20Internet%20of%20Drones&rft.jtitle=Concurrency%20and%20computation&rft.au=Perumalla,%20Subhadra&rft.date=2023-05-30&rft.volume=35&rft.issue=12&rft.epage=n/a&rft.issn=1532-0626&rft.eissn=1532-0634&rft_id=info:doi/10.1002/cpe.7667&rft_dat=%3Cproquest_cross%3E2804863257%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2937-f9f4450316e4cfea54874c809ab15afe200688aafada5319f44053a98485a5a43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2804863257&rft_id=info:pmid/&rfr_iscdi=true