A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones

被引:16
作者
Bhattarai, Image [1 ]
Pu, Cong [1 ]
Choo, Kim-Kwang Raymond [2 ]
Korac, Dragan [3 ]
机构
[1] Oklahoma State Univ, Dept Comp Sci, Stillwater, OK 74078 USA
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ Banja Luka, Dept Math & Informat, Banja Luka 78000, Bosnia & Herceg
关键词
Drones; Protocols; Authentication; Security; Internet of Things; Physical unclonable function; Cryptography; Anonymous; application-aware; authenticated key agreement; Internet of Drones (IoD); lightweight; SCHEME;
D O I
10.1109/JIOT.2024.3367799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The drone technology has continuously been evolving since the beginning of the first decade of the 21st century with exceptional growth over the last several years. To pave the way for an interoperable aerial-ground communication platform, the Internet of Drones (IoD) framework has emerged to systematically organize a batch of drones to collect multiple application-specific data simultaneously and report them to a close ground station. As the collected data might contain sensitive information, people become more critically aware of data security and privacy issues associated with IoD applications. Authentication and key agreement protocols are able to protect IoD data from unauthorized access. However, the recent schemes fail to distinguish between types of data during the authentication and key establishment process, which leads to data leakage that sensitive data are being accessed by unauthorized entities. To address the data leakage issue and fill the research gap, this article proposes a lightweight and anonymous application-aware authentication and key agreement protocol (also called liteA4) for IoD systems. The fundamental idea of liteA4 is that the ground station and the drone perform data type-aware mutual authentication and establish separate session keys for different types of data before the drone delivers the collected data to the ground station. The major techniques, such as hash function, bitwise xor, and physical unclonable function (PUF), are used to implement liteA4. We select the Automated Validation of Internet Security Protocols and Applications (AVISPAs) tool to verify the security of liteA4 in the cyber-threat environment. We also set up a simulation framework and conduct comprehensive and comparative experiments to validate the performance of liteA4. Extensive experimental results demonstrate that liteA4 not only is a safe and reliable protocol in the adversarial setting but also provides better results than its counterpart approaches in terms of communication overhead, computational time, storage cost, as well as energy consumption.
引用
收藏
页码:19790 / 19803
页数:14
相关论文
共 46 条
[1]  
Abdalla AS, 2021, IEEE Communications Standards Magazine, V5, P70, DOI [10.1109/mcomstd.001.2000032, 10.1109/MCOMSTD.001.2000032, DOI 10.1109/MCOMSTD.001.2000032]
[2]   A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks [J].
Abdel-Malek, Mai A. ;
Akkaya, Kemal ;
Bhuyan, Arupjyoti ;
Ibrahim, Ahmed S. .
IEEE ACCESS, 2022, 10 :57485-57498
[3]   Physical Unclonable Functions (PUF) for IoT Devices [J].
Al-Meer, Abdulaziz ;
Al-Kuwari, Saif .
ACM COMPUTING SURVEYS, 2023, 55 (14S)
[4]   Data Provenance for IoT With Light Weight Authentication and Privacy Preservation [J].
Aman, Muhammad Naveed ;
Basheer, Mohammed Haroon ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :10441-10457
[5]  
[Anonymous], 2019, ITU-Rec. F.749.10
[6]  
avispa, 2006, Automated validation of Internet security protocols and applications
[7]   A Critique of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones [J].
Chang, Ya-Fen ;
Huang, Sheng-Jie ;
Chen, Guan-Xi ;
Tai, Wei-Liang .
2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 :337-346
[8]  
Chevalier Y., 2004, P SAPS, P1
[9]  
comsoc, Internet-of-Drones: Novel applications, recent deployments and integration
[10]   Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era [J].
Deebak, B. D. ;
Hwang, Seong Oun .
COMPUTER NETWORKS, 2023, 225