Crowd Monitoring System Based on Unmanned Aerial Vehicles: Secure Key Agreement Scheme
Sandhya. S1, Jeshik S2, Prajwal Gajanan Hegde3
1Dr. Sandhya. S, Assistant Professor, Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
2Jeshik S, Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
3Prajwal Gajanan Hegde, Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
Manuscript received on 10 September 2024 | Revised Manuscript received on 12 September 2024 | Manuscript Accepted on 15 October 2024 | Manuscript published on 30 October 2024 | PP: 28-32 | Volume-13 Issue-11, October 2024 | Retrieval Number: 100.1/ijitee.K998113111024 | DOI: 10.35940/ijitee.K9998.13111024
Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Unmanned Arial Vehicles (UAVs) can be applied to survey or for monitoring huge crowd where conventional monitoring systems fail. Even though UAVs is proven to be effective way for monitoring and surveying there present a threat of data getting leaked when it is being transferred to the user’s device. To lessen these dangers a secure channel amid the user and the UAVs needs to be determined. There are multiple key agreement methods which is already present but they are either heavy authentication type or less secure to the attacks from the unscrupulous parties. In this paper, we provide an approach to mitigate such threats using a public key cryptographic method with a session-based authentication. The above-mentioned method is simulated using NS2 software and it’s efficiency will be recorded at the end.
Keywords: UAV, Attacks, Cryptography, Security, Authentication, Session Keys, Simulation.
Scope of the Article: Computer Science and Applications