Table 1.
Classification of drones [2].
Fig 1.
Block diagram of the proposed consumer authentication (Consumer-Auth) framework.
Fig 2.
Haar algorithm features with kernel window representation.
Fig 3.
Work flow of the proposed Consumer-Auth framework.
Table 2.
Drone specifications.
Fig 4.
Experimental setup of the proposed Consumer-Auth framework.
Fig 5.
Time and distance relationship between the theoretical and experimental curves of the proposed Consumer-Auth framework.
Fig 6.
Energy utilization comparison among cloud computing, edge computing and the proposed hybrid computing based Consumer-Auth framework.
Fig 7.
Face recognition accuracy with respect to different face angles (FA1—FA10) during the drone flight.
Fig 8.
Latency overhead comparison among cloud computing, edge computing and the proposed hybrid computing based Consumer-Auth framework in terms of face recognition attempts.