Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment

被引:0
作者
Elkamchouchi, Dalia H. [1 ]
Alzahrani, Jaber S. [2 ]
Mahgoub, Hany [3 ,4 ]
Mehanna, Amal S. [5 ]
Hilal, Anwer Mustafa [6 ]
Motwakel, Abdelwahed [6 ]
Zamani, Abu Sarwar [6 ]
Yaseen, Ishfaq [6 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[2] Umm Al Qura Univ, Coll Engn Alqunfudah, Dept Ind Engn, Mecca, Saudi Arabia
[3] King Khalid Univ, Coll Sci & Art Mahayil, Dept Comp Sci, Abha, Saudi Arabia
[4] Menoufia Univ, Fac Comp & Informat, Comp Sci Dept, Menoufia, Egypt
[5] Future Univ Egypt, Fac Comp & Informat Technol, Dept Digital Media, New Cairo 11845, Egypt
[6] Prince Sattam Bin Abdulaziz Univ, Dept Comp & Self Dev, Preparatory Year Deanship, Alkharj, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 03期
关键词
Internet of drones; atom search algorithm; clustering; encryption; signcryption; IOT-ENABLED INTERNET; KEY AGREEMENT SCHEME; PRIVACY; AUTHENTICATION; SECURITY;
D O I
10.32604/cmc.2022.031909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent technological developments have revolutionized the functioning of Wireless Sensor Network (WSN)-based industries with the development of Internet of Things (IoT). Internet of Drones (IoD) is a division under IoT and is utilized for communication amongst drones. While drones are naturally mobile, it undergoes frequent topological changes. Such alterations in the topology cause route election, stability, and scalability problems in IoD. Encryption is considered as an effective method to transmit the images in IoD environment. The current study introduces an Atom Search Optimization basedClusteringwith Encryption Technique for Secure Internet of Drones (ASOCE-SIoD) environment. The key objective of the presented ASOCE-SIoD technique is to group the drones into clusters and encrypt the images captured by drones. The presented ASOCE-SIoD technique follows ASO-based Cluster Head (CH) and cluster construction technique. In addition, signcryption technique is also applied to effectually encrypt the images captured by drones in IoD environment. This process enables the secure transmission of images to the ground station. In order to validate the efficiency of the proposed ASOCE-SIoD technique, several experimental analyses were conducted and the outcomes were inspected under different aspects. The comprehensive comparative analysis results established the superiority of the proposed ASOCE-SIoD model over recent approaches.
引用
收藏
页码:6617 / 6634
页数:18
相关论文
共 21 条
  • [1] Applications, Deployments, and Integration of Internet of Drones (IoD): A Review
    Abualigah, Laith
    Diabat, Ali
    Sumari, Putra
    Gandomi, Amir H.
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (22) : 25532 - 25546
  • [2] Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks
    Abunadi, Ibrahim
    Althobaiti, Maha M.
    Al-Wesabi, Fahd N.
    Hilal, Anwer Mustafa
    Medani, Mohammad
    Hamza, Manar Ahmed
    Rizwanullah, Mohammed
    Zamani, Abu Serwar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1195 - 1212
  • [3] Bio-inspired clustering scheme for Internet of Drones application in industrial wireless sensor network
    Aftab, Farooq
    Khan, Ali
    Zhang, Zhongshan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (11)
  • [4] Hybrid Self-Organized Clustering Scheme for Drone Based Cognitive Internet of Things
    Aftab, Farooq
    Khan, Ali
    Zhang, Zhongshan
    [J]. IEEE ACCESS, 2019, 7 : 56217 - 56227
  • [5] A new intelligent multilayer framework for insider threat detection
    Al-Mhiqani, Mohammed Nasser
    Ahmad, Rabiah
    Abidin, Z. Zainal
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Gupta, Deepak
    Shankar, K.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [6] Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems
    Alrowais, Fadwa
    Almasoud, Ahmed S.
    Marzouk, Radwa
    Al-Wesabi, Fahd N.
    Hilal, Anwer Mustafa
    Rizwanullah, Mohammed
    Motwakel, Abdelwahed
    Yaseen, Ishfaq
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 2783 - 2795
  • [7] Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in Internet of Things
    Alzubi, Omar A.
    Alzubi, Jafar A.
    Shankar, K.
    Gupta, Deepak
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12)
  • [8] Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Kumar, Neeraj
    Lorenz, Pascal
    Alazab, Mamoun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 9097 - 9111
  • [9] Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
    Bera, Basudeb
    Chattaraj, Durbadal
    Das, Ashok Kumar
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 229 - 249
  • [10] GCACS-IoD: A certificate based generic access control scheme for Internet of drones
    Chaudhry, Shehzad Ashraf
    Yahya, Khalid
    Karuppiah, Marimuthu
    Kharel, Rupak
    Bashir, Ali Kashif
    Bin Zikria, Yousaf
    [J]. COMPUTER NETWORKS, 2021, 191