USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment

被引:13
作者
Badshah, Akhtar [1 ]
Abbas, Ghulam [2 ]
Waqas, Muhammad [3 ]
Tu, Shanshan [4 ]
Abbas, Ziaul Haq [5 ]
Muhammad, Fazal [6 ]
Chen, Sheng [7 ]
机构
[1] Univ Malakand, Dept Software Engn, Lower Dir 18800, Pakistan
[2] GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Telecommun & Networking TeleCoN Res Ctr, Swabi 23640, Pakistan
[3] Univ Greenwich, Fac Engn & Sci, Sch Comp & Math Sci, London SE109LS, England
[4] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[5] GIK Inst Engn Sci & Technol, Fac Elect Engn, Swabi 23640, Pakistan
[6] Univ Engn & Technol, Dept Elect Engn, Mardan 23200, Pakistan
[7] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, England
基金
北京市自然科学基金;
关键词
Drones; Security; Feature extraction; Servers; Hash functions; Authentication; Elliptic curve cryptography; Internet of Drones (IoD); key agreement; physical unclonable functions; security; user authentication; SCHEME; PRIVACY; ISSUES;
D O I
10.1109/TVT.2024.3375758
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of Internet of Drones (IoD) technology has surged across various domains such as logistics, surveying, industrial inspections, emergency response, security, infrastructure monitoring, crop management, and more. However, real-time communication with drones or Unmanned Aerial Vehicles (UAVs) in the IoD environment occurs over an insecure open channel, making it susceptible to various security and privacy vulnerabilities, including unauthorized access, data interception, denial of service attacks, and privacy concerns. Due to their unique characteristics, including long transmission distances, unstable communication environments, resource limitations, and the highly dynamic nature of UAVs, ensuring the security and privacy of IoD systems is of paramount importance for the success of IoD-based applications. Furthermore, drones are resource-constrained devices, and employing expensive security solutions is impractical, as it would significantly reduce the operational capacity of drones. In this paper, we present the design of an ultralightweight, secure, and robust user-authenticated key agreement framework for the IoD environment, named USAF-IoD. The proposed USAF-IoD is developed by incorporating authenticated encryption (ASCON), cryptographic hashing, XOR operations, and the use of physical unclonable functions (PUFs). PUFs are employed to enhance resistance against physical tampering attacks. The security analysis reveals that the proposed USAF-IoD meets the essential security requirements of the IoD environment. The comparative analysis further highlights the effectiveness of the proposed USAF-IoD, notably excelling in terms of security and functionality characteristics when compared to existing benchmark schemes, and showcasing competitive performance in computation, communication, and energy overheads.
引用
收藏
页码:10963 / 10977
页数:15
相关论文
共 35 条
[1]   A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance [J].
Akram, Muhammad Wahid ;
Bashir, Ali Kashif ;
Shamshad, Salman ;
Saleem, Muhammad Asad ;
AlZubi, Ahmad Ali ;
Chaudhry, Shehzad Ashraf ;
Alzahrani, Bander A. ;
Bin Zikria, Yousaf .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) :19634-19643
[2]   RETRACTED: TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments (Retracted Article) [J].
Ali, Zeeshan ;
Alzahrani, Bander A. ;
Barnawi, Ahmed ;
Al-Barakati, Abdullah ;
Vijayakumar, Pandi ;
Chaudhry, Shehzad Ashraf .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[3]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[4]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[5]   AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation [J].
Badshah, Akhtar ;
Waqas, Muhammad ;
Muhammad, Fazal ;
Abbas, Ghulam ;
Abbas, Ziaul Haq ;
Chaudhry, Shehzad Ashraf ;
Chen, Sheng .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :1739-1755
[6]   LAKE-BSG: Lightweight authenticated key exchange scheme for blockchain-enabled smart [J].
Badshah, Akhtar ;
Waqas, Muhammad ;
Abbas, Ghulam ;
Muhammad, Fazal ;
Abbas, Ziaul Haq ;
Vimal, S. ;
Bilal, Muhammad .
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 52
[7]   Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J].
Bera, Basudeb ;
Chattaraj, Durbadal ;
Das, Ashok Kumar .
COMPUTER COMMUNICATIONS, 2020, 153 :229-249
[8]   Drones-as-a-service: A management architecture to provide mission planning, resource brokerage and operation support for fleets of drones [J].
Besada, Juan A. ;
Bernardos, Ana M. ;
Bergesio, Luca ;
Vaquero, Diego ;
Campana, Ivan ;
Casar, Jose R. .
2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, :931-936
[9]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[10]   GCACS-IoD: A certificate based generic access control scheme for Internet of drones [J].
Chaudhry, Shehzad Ashraf ;
Yahya, Khalid ;
Karuppiah, Marimuthu ;
Kharel, Rupak ;
Bashir, Ali Kashif ;
Bin Zikria, Yousaf .
COMPUTER NETWORKS, 2021, 191