A novel approach for securing data against adversary attacks in UAV embedded HetNet using identity based authentication scheme
نویسندگان
چکیده
Unmanned Aerial Vehicle (UAV) integrated Heterogeneous Network (HetNet) is currently considered as one of the promising technologies. This technology helps in fulfilling high demands bandwidth, volume, and range per user needs. In this paper, work carried out by authors to assure security for users such a network incorporating an authentication-based known Identity based Scheme (IBA). The IBA implemented networks improve confidentiality data authenticity users. Privacy reliability come through entity's capacity authenticate, sign transact authenticated without central directory interference. Therefore,the primary scope research project create identity-based authentication mechanism HetNets that are assisted UAVs secure communication against potential intruder threats. way, assurance increased dreadful attacks minimized. Moreover, work, implementing zones would be areas defence observation region locate enemy or certain strategic features. rules formulated coded language High Level Protocol Specification Language (HLPSL) outcomes verified Automated Validation Internet Security Protocols Applications (AVISPA).
منابع مشابه
Securing Harari's Authentication Scheme
Code-based authentication schemes are very fast and efficient for implementation in small devices. The security of these schemes and the size of underlying coding matrices are often the main barriers to their use in practice. In this paper, we remove the security flaw of a classical codebased authentication scheme and modify it to achieve a secure code-based authentication scheme. We provide a ...
متن کاملA Novel Dynamic Identity based Authentication Scheme for Multi- Server Environment using Smart Cards
Remote user authentication scheme with key agreement is a very practical mechanism to verify a remote user and then provide secure communication. Furthermore, many network environments have been becoming multi-server based due to the rapid growth of computer networks. Therefore, more and more researches have been focused on proposing smart card based remote authentication scheme with session ke...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملa new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولSecuring Against Insider Attacks
e are all creatures of habit; the way we think and the views we take are conditioned by our education, society as a whole, and, at a much deeper level, our cultural memories or instinct. It is sometimes surprising how much the past can unconsciously affect today’s thinking. George Santayana famously observed, “Those who cannot remember the past are condemned to repeat it.” But when it comes to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iet Intelligent Transport Systems
سال: 2022
ISSN: ['1751-9578', '1751-956X']
DOI: https://doi.org/10.1049/itr2.12271