Unmanned Aerial Vehicle Delivery System Using Two Level Authentication
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
In general it is impossible to complete the package delivery competently because
newlinethe main challenge is an insufficient innovative technology to identify the user for
newlinepackage authentication Therefore fingerprint authentication is one of the
newlineintelligent authentication ideas of the package used as one solution to the above
newlinereference problem The model should be prepared appropriately regarding
newlinebehavioral design to incorporate the UAV transport system in cities The drone
newlineactivity preparation and fingerprint authentication model for solutions are
newlinesuggested In terms of the computing time of the UAV and the optimality
newlinedifference the experimental results indicate a feasible solution and provide an
newlineefficient solution model New and advanced technologies have introduced
newlineamazing areas like the Internet of Vehicles IoV and Unmanned Aerial Vehicle
newlineUAV These two technologies are emerged to facilitate the ground users by
newlineproviding more fast and convenient data communication services Due to the open
newlinenature of these networks security and user privacy is always a serious concern.
newlineDifferent types of security attacks have been noticed in these networks like
newlinejamming attacks global positioning system jamming, signal jamming and data
newlinejamming. The existing solutions have been designed to resolve and tackle security
newlineissues such as authenticity insurance of data integrity provision of correct
newlinemessage authentication and removal of redundant authentication. However,
newlineexisting schemes have some limitations in terms of computational costs and
newlineefficiency and do not provide security at all levels. This work proposes an
newlineEfficient Authentication Scheme for Safety Applications for Internet of Vehicles
newlineEASSAIV for message authentication The proposed scheme can gather process and verify the information delivered to roadside units UAVs or to the
newlinevehicles and authenticate the received messages Proposed scheme achieved better
newlineperformance as compared to state of the art scheme in terms of safety packet loss
newlinedelay and computational cost Drone delivery wh