D3APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain

被引:7
作者
Dwivedi, Sanjeev Kumar [1 ]
Abdussami, Mohammad [2 ]
Amin, Ruhul [2 ]
Khan, Muhammad Khurram [3 ]
机构
[1] VIT AP Univ, VIT AP Sch Comp Sci & Engn, Amaravati 522237, India
[2] Int Inst Informat Technol, Comp Sci & Engn Dept, Naya Raipur 493661, India
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
关键词
Authentication; blockchain; elliptic curve cryptography; Internet of Drones; key agreement; ROR model; scyther; security; KEY-EXCHANGE; SCHEME;
D O I
10.1109/TCE.2023.3345893
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Tactile Internet, a fast and low-latency communication network, plays a crucial role in IoD applications for providing various features like precision control and realistic telepresence. The Internet of Drones (IoD) is a rapidly evolving concept that envisions a network of collaborating and communicating interconnected drones. Drones have diverse applications, including traffic monitoring, medicine, battlefield surveillance, logistics, and agriculture. However, the widespread deployment of drones raises significant security and privacy concerns. In this paper we have proposed secure data delivery authentication protocol for tactile Internet enabled IoD system (D(3)APTS). Also, using blockchain along with IoD for storing data will provide additional characteristics like data immutability. To secure communication among user, ground station server, and drone D(3)APTS employs one-way hash function and ECC cryptosystem. It resists various attacks like impersonation attacks, capturing attacks, session-key disclosure attacks, especially desynchronisation attacks which is important in case of IoD scenario. D(3)APTS also provides anonymity and unlinkability features. It is formally verified using the scyther security tool and ROR model. The performance analysis and comparison shows that D(3)APTS is better in terms of computation, communication overheads, security and functionality features.
引用
收藏
页码:4239 / 4248
页数:10
相关论文
共 31 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Provably secured lightweight authenticated key agreement protocol for modern health industry [J].
Abdussami, Mohammad ;
Amin, Ruhul ;
Vollala, Satyanarayana .
AD HOC NETWORKS, 2023, 141
[3]   LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment [J].
Abdussami, Mohammad ;
Amin, Ruhul ;
Vollala, Satyanarayana .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) :1373-1387
[4]   A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance [J].
Akram, Muhammad Wahid ;
Bashir, Ali Kashif ;
Shamshad, Salman ;
Saleem, Muhammad Asad ;
AlZubi, Ahmad Ali ;
Chaudhry, Shehzad Ashraf ;
Alzahrani, Bander A. ;
Bin Zikria, Yousaf .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) :19634-19643
[5]   Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment [J].
Banerjee, Soumya ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Jamal, Sajjad Shaukat ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
ELECTRONICS, 2021, 10 (12)
[6]   Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment [J].
Bera, Basudeb ;
Das, Ashok Kumar ;
Garg, Sahil ;
Piran, Md Jalil ;
Hossain, M. Shamim .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) :2708-2721
[7]   Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment [J].
Bera, Basudeb ;
Saha, Sourav ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Lorenz, Pascal ;
Alazab, Mamoun .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) :9097-9111
[8]   Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J].
Bera, Basudeb ;
Chattaraj, Durbadal ;
Das, Ashok Kumar .
COMPUTER COMMUNICATIONS, 2020, 153 :229-249
[9]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[10]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453