Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/4032
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mandal, Priti | - |
dc.contributor.author | Roy, Lakshi Prosad | - |
dc.contributor.author | Das, Santos Kumar | - |
dc.date.accessioned | 2023-07-06T11:53:14Z | - |
dc.date.available | 2023-07-06T11:53:14Z | - |
dc.date.issued | 2023-06 | - |
dc.identifier.citation | IEEE 2023 3rd International Conference for Intelligent Technologies (CONIT), Hubballi, Karnataka, India, 23-25 June 2023 | en_US |
dc.identifier.uri | http://hdl.handle.net/2080/4032 | - |
dc.description | Copyright belongs to proceedings publisher | en_US |
dc.description.abstract | Unmanned Aerial Vehicles (UAVs) are utilised in many various sectors nowadays, including military, search and rescue, and monitoring. Although there are many applications for UAVs, security has always been a top priority. Additionally, UAVs carry private information that is sensitive and poses serious risks if criminal attackers use them to their advantage. There have been numerous attempts to address UAV security issues, but there is no established method for shielding UAVs from online threats. The increased use of UAVs has prompted us to look into their security measures, particularly user authentication. In this work, new cryptographic algorithm is proposed for securely transmitting and receiving the data. Further, the proposed algorithm is analysed based on the encryption time, decryption time, throughput, and security analysis based on avalanche effect. | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Decryption | en_US |
dc.subject | Encryption | en_US |
dc.subject | Security | en_US |
dc.subject | Unmanned Aerial Vehicle | en_US |
dc.title | Hybrid cryptographic technique of data security for UAV applications | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2023_CONIT_Priti_Hybrid.pdf | 541.34 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.