Secure Routing Algorithms Integrating Zero Trust Edge Computing for Unmanned Aerial Vehicle Networks in Disaster Response Operations

Authors

  • Chima Nwankwo Idika 1Department of Computer Science, Prairie View A & M University, Prairie View Texas, USA
  • Ugoaghalam Uche James Department of Computer Information Systems. College of Engineering, Prairie View A&M University, Praire View ,77446, Texas,USA
  • Onuh Matthew Ijiga Department of Physics, Joseph Sarwaan Tarkaa University, Makurdi, Benue State, Nigeria
  • Nonso Okika Network Planning Analyst, University of Michigan, USA
  • Lawrence Anebi Enyejo Department of Telecommunications, Enforcement Ancillary and Maintenance, National Broadcasting Commission, Aso-Villa, Abuja, Nigeria

DOI:

https://doi.org/10.38124/ijsrmt.v3i6.635

Keywords:

Secure Routing Algorithms, Zero Trust Architecture (ZTA), Edge Computing, Unmanned Aerial Vehicles (UAVS), Disaster Response Networks

Abstract

Disaster response operations increasingly rely on Unmanned Aerial Vehicles (UAVs) for real-time situational awareness, resource delivery, and communication relay in environments with degraded infrastructure. However, the decentralized and dynamic nature of UAV networks introduces significant security and trust challenges, especially when operating in hostile or uncertain conditions. This review explores secure routing algorithms enhanced by Zero Trust Architecture (ZTA) principles and Edge Computing paradigms to strengthen the resilience and confidentiality of UAV communications in disaster zones. The integration of zero trust ensures that all communication nodes are continuously authenticated, authorized, and encrypted, while edge computing provides low-latency processing, decentralized intelligence, and operational autonomy. We examine recent advances in secure routing mechanisms, including trust-aware protocols, identity-based encryption, and block chain integrated path selection. Furthermore, the review assesses the deployment of edge nodes for on-site threat detection, anomaly mitigation, and routing optimization. By synthesizing findings from academic and field studies, this paper highlights current gaps, identifies future research directions, and presents a conceptual framework for implementing zero trust-secured edge based routing in UAV-based disaster management systems.

Downloads

Download data is not yet available.

Downloads

Published

2024-06-28

How to Cite

Nwankwo Idika, C., Uche James, U., Ijiga, O. M., Okika, N., & Anebi Enyejo, L. (2024). Secure Routing Algorithms Integrating Zero Trust Edge Computing for Unmanned Aerial Vehicle Networks in Disaster Response Operations. International Journal of Scientific Research and Modern Technology, 3(6), 87–100. https://doi.org/10.38124/ijsrmt.v3i6.635

PlumX Metrics takes 2–4 working days to display the details. As the paper receives citations, PlumX Metrics will update accordingly.

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)