Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications

Sourav Saha, Ashok Kumar Das, Saksham Mittal, Mohammad Wazid

Research output: Chapter in Book/Published conference outputConference publication

2 Citations (Scopus)

Abstract

In this article, we present an efficient and secure communication scheme for military applications assisted by drones. The scheme involves authentication between the drones and their respective management server (MS), ensuring that the data collected by the drones is securely aggregated at the MS. Subsequently, the MS securely transmits the aggregated data to the cloud server(s). This approach allows for secure Big Data analytics to be performed on the data collected at the semi-trusted cloud server(s). A detailed security analysis and comparative analysis demonstrate that the proposed scheme can withstand several important attacks relevant to military applications. Additionally, it proves to be efficient compared to other authentication schemes in the same context. Furthermore, experimental results on secure Big Data analytics highlight the practical aspects and effectiveness of the designed scheme.
Original languageEnglish
Title of host publicationIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
PublisherIEEE
Pages1-6
Number of pages6
ISBN (Electronic)9798350384475
DOIs
Publication statusPublished - 13 Aug 2024
EventIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) - Vancouver, BC, Canada
Duration: 20 May 202420 May 2024

Publication series

Name
ISSN (Electronic)2833-0587

Conference

ConferenceIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
Period20/05/2420/05/24

Fingerprint

Dive into the research topics of 'Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications'. Together they form a unique fingerprint.

Cite this