A novel approach for securing data against adversary attacks in UAV embedded HetNet using identity based authentication scheme

نویسندگان

چکیده

Unmanned Aerial Vehicle (UAV) integrated Heterogeneous Network (HetNet) is currently considered as one of the promising technologies. This technology helps in fulfilling high demands bandwidth, volume, and range per user needs. In this paper, work carried out by authors to assure security for users such a network incorporating an authentication-based known Identity based Scheme (IBA). The IBA implemented networks improve confidentiality data authenticity users. Privacy reliability come through entity's capacity authenticate, sign transact authenticated without central directory interference. Therefore,the primary scope research project create identity-based authentication mechanism HetNets that are assisted UAVs secure communication against potential intruder threats. way, assurance increased dreadful attacks minimized. Moreover, work, implementing zones would be areas defence observation region locate enemy or certain strategic features. rules formulated coded language High Level Protocol Specification Language (HLPSL) outcomes verified Automated Validation Internet Security Protocols Applications (AVISPA).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Harari's Authentication Scheme

Code-based authentication schemes are very fast and efficient for implementation in small devices. The security of these schemes and the size of underlying coding matrices are often the main barriers to their use in practice. In this paper, we remove the security flaw of a classical codebased authentication scheme and modify it to achieve a secure code-based authentication scheme. We provide a ...

متن کامل

A Novel Dynamic Identity based Authentication Scheme for Multi- Server Environment using Smart Cards

Remote user authentication scheme with key agreement is a very practical mechanism to verify a remote user and then provide secure communication. Furthermore, many network environments have been becoming multi-server based due to the rapid growth of computer networks. Therefore, more and more researches have been focused on proposing smart card based remote authentication scheme with session ke...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

a new approach to credibility premium for zero-inflated poisson models for panel data

هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...

15 صفحه اول

Securing Against Insider Attacks

e are all creatures of habit; the way we think and the views we take are conditioned by our education, society as a whole, and, at a much deeper level, our cultural memories or instinct. It is sometimes surprising how much the past can unconsciously affect today’s thinking. George Santayana famously observed, “Those who cannot remember the past are condemned to repeat it.” But when it comes to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iet Intelligent Transport Systems

سال: 2022

ISSN: ['1751-9578', '1751-956X']

DOI: https://doi.org/10.1049/itr2.12271