Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones

被引:0
作者
Chaudhary, Dharminder [1 ]
Lee, Cheng-Chi [2 ,3 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Comp, Dept Comp Sci & Engn, Chennai 601103, India
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City, Taiwan
[3] Asia Univ, Fintech & Blockchain Res Ctr, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
Authentication; Key agreement; Internet of Drones; Ring learning with errors; Network security; Cryptography; KEY AGREEMENT SCHEME; AUTHENTICATION; PRIVACY;
D O I
10.1016/j.compeleceng.2024.109774
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Drones (IoD) refers to the integration of unmanned aerial vehicles (UAVs) into the broader Internet of Things (IoT) ecosystem. This connection enables a wide range of applications and uses. An authenticated key agreement for the Internet of Drones (IoD) allows mobile device owners to establish a connection with a group of drones remotely for safe and effective services including supply delivery, sending photos and data from surveillance, and other communication services. The exchange of sensitive information through open channel, such as the internet, comes with challenges in terms of data protection and authentication. The invention of Shor's technique, though, creates complications for authorized and secure communication in the era of highly advanced quantum computers. Therefore, we have proposed a secure authenticated key agreement the Internet of Drones (IoD) based on lattice assumption called "Ring Learning With Error" on lattices. The RLWE operates on algebraic structures known as polynomial rings, which permits faster and space-efficient cryptographic operations. This efficiency is especially beneficial for limited storage devices (IoD/IoT). This framework is able to withstand quantum attacks, and it is suitable for low computation devices. This protocol provides anonymous communication for both user and drone. Additionally, this protocol ensures user privacy, from breaking session key security, or from withstanding impersonation attacks, and enables mutual authentication, and it utilizes dynamic identities and ensures freshness of messages. The performance analysis indicates that the proposed system performs better than existing state-of-the-art solutions when tested on benchmark datasets using various evaluation metrics.
引用
收藏
页数:14
相关论文
共 24 条
  • [1] A modified lightweight authenticated key agreement protocol for Internet of Drones
    Chaudhary, Dharminder
    Soni, Tanmay
    Vasudev, Kondeti Lakshmi
    Saleem, Kashif
    [J]. INTERNET OF THINGS, 2023, 21
  • [2] Privacy Protection for Internet of Drones: A Network Coding Approach
    Chen, Yu-Jia
    Wang, Li-Chun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1719 - 1730
  • [3] Internet of drones security: Taxonomies, open issues, and future directions
    Derhab, Abdelouahid
    Cheikhrouhou, Omar
    Allouch, Azza
    Koubaa, Anis
    Qureshi, Basit
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Khan, Farrukh Aslam
    [J]. VEHICULAR COMMUNICATIONS, 2023, 39
  • [4] Dheerendra Mishra, 2023, IEEE Trans Veh Technol, V1, P1
  • [5] Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
    Ding, Jintai
    Alsayigh, Saed
    Lancrenon, Jean
    Saraswathy, R., V
    Snook, Michael
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 183 - 204
  • [6] SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
    El-Zawawy, Mohamed A.
    Brighente, Alessandro
    Conti, Mauro
    [J]. COMPUTER NETWORKS, 2022, 206
  • [7] Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices
    Feng, Qi
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2775 - 2785
  • [8] Designing secure and lightweight user access to drone for smart city surveillance
    Hussain, Sajid
    Mahmood, Khalid
    Khan, Muhammad Khurram
    Chen, Chien-Ming
    Alzahrani, Bander A.
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [9] Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
    Hussain, Sajid
    Chaudhry, Shehzad Ashraf
    Alomari, Osama Ahmad
    Alsharif, Mohammed H.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 4431 - 4438
  • [10] Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones
    Lee, Tian-Fu
    Lou, Der-Chyuan
    Chang, Chien-Hung
    [J]. INTERNET OF THINGS, 2023, 23