SEAF-IoD: Secure and efficient user authentication framework for the Internet of Drones

被引:2
|
作者
Tanveer, Muhammad [1 ]
Aldosary, Abdallah [2 ]
Kumar, Neeraj [3 ]
Aldossari, Saud Alhajaj [4 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Prince Sattam bin Abdulaziz Univ, Dept Comp Engn, Wadi Addwasir 11991, Ar Riyad, Saudi Arabia
[3] CSED Thapar Inst Engn & Technol, Patiala, Punjab, India
[4] Prince Sattam bin Abdulaziz Univ Wadi Aldawsar, Dept Elect Engn, Wadi Addawasir, Ar Riyadh, Saudi Arabia
关键词
Internet of Drones; Encryption; Session key; Authentication; KEY AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; PROTOCOL;
D O I
10.1016/j.comnet.2024.110449
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Drones (IoD) stands as a rapidly advancing technology, finding applications across civilian, military, and industrial domains, facilitating the efficient execution of challenging tasks. However, the IoD environment introduces a plethora of security concerns. Drones, for example, must exchange critical information with control station servers and users through open and unsecured wireless channels. Consequently, protecting these sensitive data becomes paramount, leading to the development of SEAF-IoD, a secure and efficient user authentication framework for the IoD, as presented in this paper. SEAF-IoD relies on symmetric encryption, physical uncloneable functions (PUF), and hash functions. This framework empowers users to securely establish connections and obtain real-time data from specific drones deployed within the IoD environment. Furthermore, the utilization of PUF holds great promise in achieving cost-effective security. PUF obviates the necessity to store confidential keys in device memory, offering a potential alternative for establishing a more secure and cost-efficient authentication framework for IoD systems. PUF empowers the SEAF-IoD to enhance its resilience against privileged insider attacks and drone/device capture attempts. To ensure the robustness of SEAF-IoD, it undergoes rigorous validation using BAN logic and Scyther simulation. Furthermore, an informal analysis affirms that SEAF-IoD fulfills critical security requirements and effectively thwarts various adversarial threats, including privileged insider, replay, and impersonation attacks. A comprehensive comparison of SEAF-IoD against existing schemes highlights its resilience and superiority in safeguarding IoD environments.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [22] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    JournalofCentralSouthUniversity, 2013, 20 (10) : 2741 - 2746
  • [23] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [24] An Efficient and Reliable User Access Protocol for Internet of Drones
    Hussain, Sajid
    Farooq, Muhammad
    Alzahrani, Bander. A. A.
    Albeshri, Aiiad
    Alsubhi, Khalid
    Chaudhry, Shehzad Ashraf
    IEEE ACCESS, 2023, 11 : 59688 - 59700
  • [25] A multi-factor user authentication protocol for the internet of drones environment
    Sousa, Manuela de Jesus
    Gondim, Paulo Roberto L.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [26] CLAACS-IOD: Certificate-embedded lightweight authentication and access control scheme for Internet of Drones
    Sadhukhan, Dipanwita
    Ray, Sangram
    Dasgupta, Mou
    Rodrigues, Joel J. P. C.
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10): : 1972 - 2006
  • [27] ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
    Jiang, Rui
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (04): : 1700 - 1724
  • [28] A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones
    Choi, Jihye
    Son, Seunghwan
    Kwon, Deokkyu
    Park, Youngho
    SENSORS, 2025, 25 (03)
  • [29] A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Islam, S. K. Hafizul
    Moghadam, Mostafa Farhadi
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115
  • [30] PSECAS: A physical unclonable function based secure authentication scheme for Internet of Drones
    Sharma, Muskan
    Narwal, Bhawna
    Anand, Revika
    Mohapatra, Amar Kumar
    Yadav, Richa
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108