Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions

Recently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data i...

Full description

Saved in:
Bibliographic Details
Main Authors: Alanoud F. Aldweesh, Abdullah M. Almuhaideb
Format: Article
Language:English
Published: MDPI AG 2025-05-01
Series:Journal of Sensor and Actuator Networks
Subjects:
Online Access:https://www.mdpi.com/2224-2708/14/3/57
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1839653594386661376
author Alanoud F. Aldweesh
Abdullah M. Almuhaideb
author_facet Alanoud F. Aldweesh
Abdullah M. Almuhaideb
author_sort Alanoud F. Aldweesh
collection DOAJ
description Recently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data in real-time through public communication channels. However, this fact introduces the risk of attack on data transmitted over unsecured public channels. Addressing several security threats is crucial to ensuring the secure operation of IoD networks. Robust authentication protocols play a vital role in establishing secure processes in the IoD environment. However, designing efficient and lightweight authentication solutions is a complex task due to the unique characteristics of the IoD and the limitations of drones in terms of their communication and computational capabilities. There is a need to review the role of authentication processes in controlling security threats in the IoD due to the increasing complexity and frequency of security breaches. This review will present the primary issues and future path directions for authentication schemes in the IoD and provide a framework for relevant existing schemes to facilitate future research into the IoD. Consequently, in this paper, we review the literature to highlight the research conducted in this area of the IoD. This study reviews several existing methods for authenticating entities in the IoD environment. Moreover, this study discusses security requirements and highlights several challenges encountered with the authentication schemes used in the IoD. The findings of this paper suggest future directions for research to consider in order for this domain to continue to evolve.
format Article
id doaj-art-c3db6032c6a54bb0bcc3f07b72cf2ffe
institution Matheson Library
issn 2224-2708
language English
publishDate 2025-05-01
publisher MDPI AG
record_format Article
series Journal of Sensor and Actuator Networks
spelling doaj-art-c3db6032c6a54bb0bcc3f07b72cf2ffe2025-06-25T14:03:32ZengMDPI AGJournal of Sensor and Actuator Networks2224-27082025-05-011435710.3390/jsan14030057Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future DirectionsAlanoud F. Aldweesh0Abdullah M. Almuhaideb1Department of Computer Science, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi ArabiaDepartment of Networks and Communications, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi ArabiaRecently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data in real-time through public communication channels. However, this fact introduces the risk of attack on data transmitted over unsecured public channels. Addressing several security threats is crucial to ensuring the secure operation of IoD networks. Robust authentication protocols play a vital role in establishing secure processes in the IoD environment. However, designing efficient and lightweight authentication solutions is a complex task due to the unique characteristics of the IoD and the limitations of drones in terms of their communication and computational capabilities. There is a need to review the role of authentication processes in controlling security threats in the IoD due to the increasing complexity and frequency of security breaches. This review will present the primary issues and future path directions for authentication schemes in the IoD and provide a framework for relevant existing schemes to facilitate future research into the IoD. Consequently, in this paper, we review the literature to highlight the research conducted in this area of the IoD. This study reviews several existing methods for authenticating entities in the IoD environment. Moreover, this study discusses security requirements and highlights several challenges encountered with the authentication schemes used in the IoD. The findings of this paper suggest future directions for research to consider in order for this domain to continue to evolve.https://www.mdpi.com/2224-2708/14/3/57authenticationInternet of Drones (IoD)securityunmanned aerial vehicle (UAV)drone
spellingShingle Alanoud F. Aldweesh
Abdullah M. Almuhaideb
Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
Journal of Sensor and Actuator Networks
authentication
Internet of Drones (IoD)
security
unmanned aerial vehicle (UAV)
drone
title Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
title_full Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
title_fullStr Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
title_full_unstemmed Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
title_short Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
title_sort authentication techniques in internet of drones iod taxonomy open challenges and future directions
topic authentication
Internet of Drones (IoD)
security
unmanned aerial vehicle (UAV)
drone
url https://www.mdpi.com/2224-2708/14/3/57
work_keys_str_mv AT alanoudfaldweesh authenticationtechniquesininternetofdronesiodtaxonomyopenchallengesandfuturedirections
AT abdullahmalmuhaideb authenticationtechniquesininternetofdronesiodtaxonomyopenchallengesandfuturedirections