![]()
Crowd Monitoring System Based on Unmanned Aerial Vehicles: Secure Key Agreement Scheme
Sandhya. S1, Jeshik S2, Prajwal Gajanan Hegde3
1Dr. Sandhya. S, Assistant Professor, Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
2Jeshik S, Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
3Prajwal Gajanan Hegde, Department of Computer Science and Engineering R V College of Engineering Bangalore (Karnataka), India.
Manuscript received on 10 September 2024 | Revised Manuscript received on 12 September 2024 | Manuscript Accepted on 15 October 2024 | Manuscript published on 30 October 2024 | PP: 28-32 | Volume-13 Issue-11, October 2024 | Retrieval Number: 100.1/ijitee.K998113111024 | DOI: 10.35940/ijitee.K9998.13111024
Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Unmanned Aerial Vehicles (UAVs) can be applied to survey or for monitoring a huge crowd where conventional monitoring systems fail. Even though UAVs are proven to be an effective way for monitoring and surveying, they present a threat of data being leaked when it is being transferred to the user’s device. To mitigate these dangers, a secure channel must be established between the user and the UAVs. There are multiple key agreement methods already in place, but they are either of a heavy authentication type or less secure against attacks from unscrupulous parties. In this paper, we propose an approach to mitigate such threats using a public-key cryptographic method with session-based authentication. The process mentioned above is simulated using NS2 software, and its efficiency will be recorded at the end.
Keywords: UAV, Attacks, Cryptography, Security, Authentication, Session Keys, Simulation.
Scope of the Article: Computer Science and Applications
