PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones

被引:16
作者
Tanveer, Muhammad [1 ]
Aldosary, Abdallah [2 ]
Khokhar, Salah-ud-din [3 ]
Das, Ashok Kumar [4 ]
Aldossari, Saud Alhajaj [5 ]
Chaudhry, Shehzad Ashraf [6 ,7 ]
机构
[1] Univ Management & Technol, Sch Syst & Technol SST, Lahore 54770, Pakistan
[2] Prince Sattam bin Abdulaziz Univ, Dept Comp Engn, Wadi Addwasir 11991, Saudi Arabia
[3] Qilu Inst Technol, Sch Intelligent Mfg & Control Engn, Jinan 250200, Peoples R China
[4] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[5] Prince Sattam bin Abdulaziz Univ Wadi Aldawsar, Dept Elect Engn, Wadi Addwasir, Saudi Arabia
[6] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi 59911, U Arab Emirates
[7] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
关键词
Authentication; physical unclonable functions (PUFs); AEGIS; internet of drones (IoD); KEY AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; PROTOCOL; SURVEILLANCE;
D O I
10.1109/TVT.2024.3365992
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rise of smart cities and the increasing demand for drones has sparked considerable interest in the Internet of Drones (IoD) within the realms of academia and industry. IoD presents a multitude of advantages in smart city settings, facilitating services like traffic monitoring, environmental surveillance, and disaster management by harnessing the potential of IoT and Flying Ad-Hoc Networks (FANET) infrastructures. However, the transmission of sensitive messages between drones in IoD-based smart cities is disseminated over insecure channels, leaving them exposed to security vulnerabilities. Furthermore, drones operating in IoD architectures are prone to physical capture attacks as they operate in unattended environments with minimal human intervention. Moreover, the limited resources of drones pose challenges to the practicality of employing computationally intensive cryptographic methods. In response to these challenges, we introduce PAF-IoD, an authentication framework that prioritizes security and efficiency. PAF-IoD leverages physical unclonable functions (PUFs) and the AEGIS authenticated encryption scheme to guarantee trustworthy and secure communication between users and drones in smart cities. In terms of security validation, we perform both random and real model-based formal analyses. Furthermore, we employ the Scyther tool to ensure the resilience of PAF-IoD against different security vulnerabilities. Additionally, an informal analysis is conducted to demonstrate the resilience of PAF-IoD against various attacks. By introducing PAF-IoD, we offer a secure solution that addresses vulnerabilities and resource limitations associated with drone communication. The proposed framework guarantees the integrity and confidentiality of data while optimizing computational and communication resources, thereby enabling reliable and effective IoD operations in smart cities.
引用
收藏
页码:9560 / 9574
页数:15
相关论文
共 41 条
[1]   General classification of the authenticated encryption schemes for the CAESAR competition [J].
Abed, Farzaneh ;
Forler, Christian ;
Lucks, Stefan .
COMPUTER SCIENCE REVIEW, 2016, 22 :13-26
[2]   Drone Transportation System: Systematic Review of Security Dynamics for Smart Mobility [J].
Ajakwe, Simeon Okechukwu ;
Kim, Dong-Seong ;
Lee, Jae-Min .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (16) :14462-14482
[3]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[4]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[5]   PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Naren ;
Kumar, Neeraj .
COMPUTER COMMUNICATIONS, 2020, 160 (160) :81-90
[6]   A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems [J].
Alzahrani B.A. ;
Barnawi A. ;
Chaudhry S.A. .
Security and Communication Networks, 2021, 2021
[7]  
Amin R., 2023, J. Ambient Intell. Humanized Comput., V39, P1
[8]   A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System [J].
Chaudhry, Shehzad Ashraf ;
Irshad, Azeem ;
Khan, Muhammad Asghar ;
Khan, Sajjad Ahmad ;
Nosheen, Summera ;
AlZubi, Ahmad Ali ;
Zikria, Yousaf Bin .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :2401-2410
[9]  
Derhab A., 2022, Veh. Commun.
[10]   A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications [J].
Ever, Yoney Kirsal .
COMPUTER COMMUNICATIONS, 2020, 155 :143-149