Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
Recently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data i...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-05-01
|
Series: | Journal of Sensor and Actuator Networks |
Subjects: | |
Online Access: | https://www.mdpi.com/2224-2708/14/3/57 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1839653594386661376 |
---|---|
author | Alanoud F. Aldweesh Abdullah M. Almuhaideb |
author_facet | Alanoud F. Aldweesh Abdullah M. Almuhaideb |
author_sort | Alanoud F. Aldweesh |
collection | DOAJ |
description | Recently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data in real-time through public communication channels. However, this fact introduces the risk of attack on data transmitted over unsecured public channels. Addressing several security threats is crucial to ensuring the secure operation of IoD networks. Robust authentication protocols play a vital role in establishing secure processes in the IoD environment. However, designing efficient and lightweight authentication solutions is a complex task due to the unique characteristics of the IoD and the limitations of drones in terms of their communication and computational capabilities. There is a need to review the role of authentication processes in controlling security threats in the IoD due to the increasing complexity and frequency of security breaches. This review will present the primary issues and future path directions for authentication schemes in the IoD and provide a framework for relevant existing schemes to facilitate future research into the IoD. Consequently, in this paper, we review the literature to highlight the research conducted in this area of the IoD. This study reviews several existing methods for authenticating entities in the IoD environment. Moreover, this study discusses security requirements and highlights several challenges encountered with the authentication schemes used in the IoD. The findings of this paper suggest future directions for research to consider in order for this domain to continue to evolve. |
format | Article |
id | doaj-art-c3db6032c6a54bb0bcc3f07b72cf2ffe |
institution | Matheson Library |
issn | 2224-2708 |
language | English |
publishDate | 2025-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Journal of Sensor and Actuator Networks |
spelling | doaj-art-c3db6032c6a54bb0bcc3f07b72cf2ffe2025-06-25T14:03:32ZengMDPI AGJournal of Sensor and Actuator Networks2224-27082025-05-011435710.3390/jsan14030057Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future DirectionsAlanoud F. Aldweesh0Abdullah M. Almuhaideb1Department of Computer Science, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi ArabiaDepartment of Networks and Communications, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi ArabiaRecently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data in real-time through public communication channels. However, this fact introduces the risk of attack on data transmitted over unsecured public channels. Addressing several security threats is crucial to ensuring the secure operation of IoD networks. Robust authentication protocols play a vital role in establishing secure processes in the IoD environment. However, designing efficient and lightweight authentication solutions is a complex task due to the unique characteristics of the IoD and the limitations of drones in terms of their communication and computational capabilities. There is a need to review the role of authentication processes in controlling security threats in the IoD due to the increasing complexity and frequency of security breaches. This review will present the primary issues and future path directions for authentication schemes in the IoD and provide a framework for relevant existing schemes to facilitate future research into the IoD. Consequently, in this paper, we review the literature to highlight the research conducted in this area of the IoD. This study reviews several existing methods for authenticating entities in the IoD environment. Moreover, this study discusses security requirements and highlights several challenges encountered with the authentication schemes used in the IoD. The findings of this paper suggest future directions for research to consider in order for this domain to continue to evolve.https://www.mdpi.com/2224-2708/14/3/57authenticationInternet of Drones (IoD)securityunmanned aerial vehicle (UAV)drone |
spellingShingle | Alanoud F. Aldweesh Abdullah M. Almuhaideb Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions Journal of Sensor and Actuator Networks authentication Internet of Drones (IoD) security unmanned aerial vehicle (UAV) drone |
title | Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions |
title_full | Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions |
title_fullStr | Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions |
title_full_unstemmed | Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions |
title_short | Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions |
title_sort | authentication techniques in internet of drones iod taxonomy open challenges and future directions |
topic | authentication Internet of Drones (IoD) security unmanned aerial vehicle (UAV) drone |
url | https://www.mdpi.com/2224-2708/14/3/57 |
work_keys_str_mv | AT alanoudfaldweesh authenticationtechniquesininternetofdronesiodtaxonomyopenchallengesandfuturedirections AT abdullahmalmuhaideb authenticationtechniquesininternetofdronesiodtaxonomyopenchallengesandfuturedirections |