SEAF-IoD: Secure and efficient user authentication framework for the Internet of Drones

被引:2
|
作者
Tanveer, Muhammad [1 ]
Aldosary, Abdallah [2 ]
Kumar, Neeraj [3 ]
Aldossari, Saud Alhajaj [4 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Prince Sattam bin Abdulaziz Univ, Dept Comp Engn, Wadi Addwasir 11991, Ar Riyad, Saudi Arabia
[3] CSED Thapar Inst Engn & Technol, Patiala, Punjab, India
[4] Prince Sattam bin Abdulaziz Univ Wadi Aldawsar, Dept Elect Engn, Wadi Addawasir, Ar Riyadh, Saudi Arabia
关键词
Internet of Drones; Encryption; Session key; Authentication; KEY AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; PROTOCOL;
D O I
10.1016/j.comnet.2024.110449
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Drones (IoD) stands as a rapidly advancing technology, finding applications across civilian, military, and industrial domains, facilitating the efficient execution of challenging tasks. However, the IoD environment introduces a plethora of security concerns. Drones, for example, must exchange critical information with control station servers and users through open and unsecured wireless channels. Consequently, protecting these sensitive data becomes paramount, leading to the development of SEAF-IoD, a secure and efficient user authentication framework for the IoD, as presented in this paper. SEAF-IoD relies on symmetric encryption, physical uncloneable functions (PUF), and hash functions. This framework empowers users to securely establish connections and obtain real-time data from specific drones deployed within the IoD environment. Furthermore, the utilization of PUF holds great promise in achieving cost-effective security. PUF obviates the necessity to store confidential keys in device memory, offering a potential alternative for establishing a more secure and cost-efficient authentication framework for IoD systems. PUF empowers the SEAF-IoD to enhance its resilience against privileged insider attacks and drone/device capture attempts. To ensure the robustness of SEAF-IoD, it undergoes rigorous validation using BAN logic and Scyther simulation. Furthermore, an informal analysis affirms that SEAF-IoD fulfills critical security requirements and effectively thwarts various adversarial threats, including privileged insider, replay, and impersonation attacks. A comprehensive comparison of SEAF-IoD against existing schemes highlights its resilience and superiority in safeguarding IoD environments.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
    Zhang, Naijian
    Jiang, Qi
    Li, Long
    Ma, Xindi
    Ma, Jianfeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3319 - 3332
  • [32] An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
    Naijian Zhang
    Qi Jiang
    Long Li
    Xindi Ma
    Jianfeng Ma
    Peer-to-Peer Networking and Applications, 2021, 14 : 3319 - 3332
  • [33] A secure and efficient authentication scheme in the Internet of Vehicle communication
    Xu X.
    Wang Y.
    Wang P.
    Ji H.
    Personal and Ubiquitous Computing, 2024, 28 (01) : 227 - 244
  • [34] An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones
    Javed, Sana
    Khan, Muhammad Asghar
    Abdullah, Ako Muhammad
    Alsirhani, Amjad
    Alomari, Abdullah
    Noor, Fazal
    Ullah, Insaf
    DRONES, 2022, 6 (10)
  • [35] Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing
    Tanveer, Muhammad
    Khan, Abd Ullah
    Nguyen, Tu N.
    Ahmad, Musheer
    El-Latif, Ahmed A. Abd
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 3058 - 3070
  • [36] Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones
    Subramani, Jegadeesan
    Maria, Azees
    Rajasekaran, Arun Sekar
    Lloret, Jaime
    SECURITY AND PRIVACY, 2024, 7 (03)
  • [37] A probably secure biometric-based authentication and key agreement scheme for Internet of Drones
    Gautam, Deepika
    Rana, Aryan
    Obaidat, Mohammad S.
    Kumar, Pankaj
    Prajapat, Sunil
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (01):
  • [38] An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
    Yahuza, Muktar
    Idris, Mohd Yamani Idna
    Wahab, Ainuddin Wahid Abdul
    Nandy, Tarak
    Ahmedy, Ismail Bin
    Ramli, Roziana
    IEEE ACCESS, 2021, 9 : 31420 - 31440
  • [39] An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    Soobok Shin
    Hongjin Yeh
    Kangseok Kim
    Peer-to-Peer Networking and Applications, 2015, 8 : 674 - 683
  • [40] An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    Shin, Soobok
    Yeh, Hongjin
    Kim, Kangseok
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 674 - 683