THE INTERNET OF DRONES is an architecture designed for providing coordinated access to controlled airspace for unmanned aerial vehicles (UAVs), often referred to as drones .

Dronecollects and sends data of interest (e.g.-video, photo, or other sensing data) to the closest ground control station (GCS).

.Then the GCS connects to the surveillance center (SC) through the private network. Finally, the SC utilizes the data from GC to analyze the behavior of interest (i.e.-target).

Drone have less computing power.
Drones must satisfy requirements . mandated by the relevant authority, such as the United States Federal Aviation Administration’s

-> There must be an airworthiness certificate.
->An IFR flight plan must be registered and executed.

->It must be equipped with automatic dependent surveillance — broadcast (ADS-B) (Out) (i.e., ADS broadcasting component)

->It must meet the minimum performance and equipage requirements of the area where the operation takes place.

->There must be a flight crew, including a pilot in command who is in charge of only one drone.
->Fully autonomous operations will not be allowed.
The Internet of Drones (IoD) can be broadly defined as a layered network control architecture designed for coordinating the access of drones to controlled airspace and providing navigation services . It consists of the following layers:

1) airspace,
2) node-to-node,
3) end-to-end,
4) services, and
5) applications. In the layered IoD architecture, every layer can utilize services provided by all layers.

Network Architecture for the communication
For designing the architecture of the IoD, we study three distinct large scale network structures;
air traffic control (ATC),
cellular network,
and the Internet.
Coordination - manages path collison control and coordinates with other UAVs.
Sensing - Senses, collects and analyzes data.
Communication And Networking - Dissemination of collected data.
UAV Application - Various applications of UAVs in various fields.
Two types of Privacy Leakage in IOD :
Identity Privacy Leakage - Needs true identity of the drone to be protected. As this could be used to profile an individual drone, planning a physical attack on building and installation.

Location Privacy Leakage - Pseudonyms used to locate the drones geographically can compromise location and hence result in the breach of location privacy.

We have introduced a Zone Concept :
We have Individual zones,where these drones operate.
Concept of ZSPbetween s(Zone Service Providers) -
For drone navigation.
Provides information to requesting drones.
Helps adjacent ZSPs to manage and coordinate with each other.
Connections various drones - Inbound and Outbound Gates.