Abstract:
In this article, we present an efficient and secure communication scheme for military applications assisted by drones. The scheme involves authentication between the dron...Show MoreMetadata
Abstract:
In this article, we present an efficient and secure communication scheme for military applications assisted by drones. The scheme involves authentication between the drones and their respective management server (MS), ensuring that the data collected by the drones is securely aggregated at the MS. Subsequently, the MS securely transmits the aggregated data to the cloud server(s). This approach allows for secure Big Data analytics to be performed on the data collected at the semi-trusted cloud server(s). A detailed security analysis and comparative analysis demonstrate that the proposed scheme can withstand several important attacks relevant to military applications. Additionally, it proves to be efficient compared to other authentication schemes in the same context. Furthermore, experimental results on secure Big Data analytics highlight the practical aspects and effectiveness of the designed scheme.
Published in: IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
Date of Conference: 20-20 May 2024
Date Added to IEEE Xplore: 13 August 2024
ISBN Information:
ISSN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Big Data Analytics ,
- Military Applications ,
- Cloud Computing ,
- Secure Communication ,
- Authentication Scheme ,
- Internet Of Things ,
- Privacy Issues ,
- Unmanned Aerial Vehicles ,
- Internet Of Things Devices ,
- Smart Devices ,
- Secret Key ,
- Communication Cost ,
- Public Key ,
- Elliptic Curve ,
- Control Room ,
- Threat Model ,
- Replay Attacks ,
- Public Channel ,
- Man-in-the-middle ,
- Network Entities ,
- Session Key ,
- Physical Unclonable Functions ,
- Mutual Authentication ,
- Current Timestamp ,
- Impersonation Attack ,
- Authentication Process ,
- Deep Learning Models ,
- Message Authentication ,
- Secure Data Storage ,
- Data Pre-processing
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Big Data Analytics ,
- Military Applications ,
- Cloud Computing ,
- Secure Communication ,
- Authentication Scheme ,
- Internet Of Things ,
- Privacy Issues ,
- Unmanned Aerial Vehicles ,
- Internet Of Things Devices ,
- Smart Devices ,
- Secret Key ,
- Communication Cost ,
- Public Key ,
- Elliptic Curve ,
- Control Room ,
- Threat Model ,
- Replay Attacks ,
- Public Channel ,
- Man-in-the-middle ,
- Network Entities ,
- Session Key ,
- Physical Unclonable Functions ,
- Mutual Authentication ,
- Current Timestamp ,
- Impersonation Attack ,
- Authentication Process ,
- Deep Learning Models ,
- Message Authentication ,
- Secure Data Storage ,
- Data Pre-processing
- Author Keywords