A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones

被引:0
作者
Algarni, Ali Delham [1 ]
Innab, Nisreen [2 ]
Algarni, Fahad [1 ]
机构
[1] Univ Bisha, Fac Comp & Informat Technol, Bisha, Saudi Arabia
[2] AlMaarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, Riyadh, Saudi Arabia
关键词
ELLIPTIC CURVE CRYPTOGRAPHY; LIGHTWEIGHT AUTHENTICATION; KEY AGREEMENT; MUTUAL AUTHENTICATION; PROVABLY SECURE; INTERNET; SCHEME;
D O I
10.1371/journal.pone.0314475
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Drones have limited computing and storage resources, which makes them unable to perform complex tactical tasks; drones working in clusters can be employed for such complex tactical task completion. But, the synergy between these drones working in clusters is mandatory. Otherwise, the adversary can easily target them, disturb their routine work, and even disturb the whole system. Only a robust and lightweight authentication protocol can handle both information fusion and collaboration and coordination of drones working in clusters efficiently and effectively and is one of the essential components of the Internet of Drones (IoD) environment as it is deployed for quick and intelligent decisions. In this regard, the already available security mechanisms for IoD deployment drones have either design flaws or failed to provide security against session key disclosure, spoofing, man in the middle (MITM), and denial of service (DoS) attacks. Therefore, this article presents a protocol based on elliptic curve cryptography (ECC), one-way hash, concatenation, and exclusive-OR (XOR) operations to establish a secure communication session among drones which makes them a powerful system to perform complex tactical tasks and information fusion intelligently. The security analysis of the proposed protocol has formally been scrutinized via BAN logic and ProVerif and informally via realistic discussion and illustrations. The results obtained from the analysis sections demonstrate that the proposed protocol is robust in security and is 63.87% more efficient in terms of communication cost compared to its competitors, and 66.46% better in terms of computational cost.
引用
收藏
页数:29
相关论文
共 49 条
[1]   Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology [J].
Abu-Hashem, Muhannad ;
Gutub, Adnan .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022, 7 (02) :278-291
[2]   Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications [J].
Alassaf, Norah ;
Gutub, Adnan .
INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS, 2019, 10 (04) :1-15
[3]   Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications [J].
Alassaf, Norah ;
Gutub, Adnan ;
Parah, Shabir A. ;
Al Ghamdi, Manal .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) :32633-32657
[4]   PSLAPS-IoD: A Provable Secure and Lightweight Authentication Protocol for Securing Internet-of-Drones (IoD) Environment [J].
Algarni, Fahad ;
Jan, Saeed Ullah .
IEEE ACCESS, 2024, 12 :45948-45960
[5]  
Alkhudaydi MG., 2020, Journal of Information Security and Cybercrimes Research, V3, P13
[6]   PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Naren ;
Kumar, Neeraj .
COMPUTER COMMUNICATIONS, 2020, 160 (160) :81-90
[7]  
Alotaibi M., 2019, J Inf Secur Cybercrimes Res, V2, P73
[8]  
Alzahrani A., 2024, IEEE Access
[9]   IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication [J].
Amin R. ;
Jayaswal S. ;
Sureshkumar V. ;
Rathore B. ;
Jha A. ;
Abdussami M. .
Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) :9529-9542
[10]  
[Anonymous], WHY ANTHEM WAS WRONG