REHAS: Robust and Efficient Hyperelliptic Curve-Based Authentication Scheme for Internet of Drones

被引:0
作者
Pratap, Bhanu [1 ]
Singh, Ayush [1 ]
Mehra, Pawan Singh [1 ]
机构
[1] Delhi Technol Univ, Dept CSE, New Delhi, India
关键词
authentication; HECC; internet of drones; Scyther; security; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; SECURE; PROTOCOL; SURVEILLANCE; BLOCKCHAIN; PRIVACY;
D O I
10.1002/cpe.8333
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Internet of Drones (IoD) is one of the most beneficial and has many versatile applications like Surveillance and Security, Delivery and Logistics, Environmental Monitoring, Agriculture, and so forth. The IoD network is crucial for collecting sensitive data like geo-coordinates, vehicle traffic data, and property details while surveying the various deployment locations in smart cities. The communication between users and drones can be compromised over insecure wireless channels by multiple attacks such as Man-in-the-middle-attack, Denial of Service, and so forth. Many schemes have already been propounded in the field of IoD. Still, many of them cannot address the resource constraints problem of drones, and existing protocols have higher computation and communication costs. Therefore, this paper has proposed a robust and efficient Hyper-Elliptic Curve-based authentication scheme (REHAS), which provides a session key for secure communication. Artificial Identities are generated using a hash function and random numbers. Fuzzy Extractor is used for user biometric authentication, which makes the smart device secure when lost. HECC is used with a smaller bit size of 80 bits rather than ECC of 160 bits. The security of the REHAS has been ensured using Scyther simulation. Furthermore, the resilience, safety, and robustness of REHAS are ensured by Informal security analysis. Lastly, a comparative study of the REHAS has been performed with other related Authentication and key agreement (AKA) protocols regarding communication cost, Computation cost, and security features, demonstrating that REHAS incurred less computation cost (6.7171 ms), communication overhead (1696 bits), and energy consumption (22.5 mJ) than other existing AKA schemes.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones
    Berini, Aymen Dia Eddine
    Ferrag, Mohamed Amine
    Farou, Brahim
    Seridi, Hamid
    PERVASIVE AND MOBILE COMPUTING, 2023, 92
  • [2] Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
    Hussain, Sajid
    Chaudhry, Shehzad Ashraf
    Alomari, Osama Ahmad
    Alsharif, Mohammed H.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 4431 - 4438
  • [3] An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones
    Javed, Sana
    Khan, Muhammad Asghar
    Abdullah, Ako Muhammad
    Alsirhani, Amjad
    Alomari, Abdullah
    Noor, Fazal
    Ullah, Insaf
    DRONES, 2022, 6 (10)
  • [4] RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones
    Tanveer, Muhammad
    Alkhayyat, Ahmed
    Naushad, Alamgir
    Khan, Abd Ullah
    Kumar, Neeraj
    Alharbi, Abdullah G.
    IEEE ACCESS, 2022, 10 : 19836 - 19851
  • [5] TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
    Srinivas, Jangirala
    Das, Ashok Kumar
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (07) : 6903 - 6916
  • [6] PSECAS: A physical unclonable function based secure authentication scheme for Internet of Drones
    Sharma, Muskan
    Narwal, Bhawna
    Anand, Revika
    Mohapatra, Amar Kumar
    Yadav, Richa
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [7] A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Islam, S. K. Hafizul
    Moghadam, Mostafa Farhadi
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115
  • [8] Toward efficient security-based authentication for the internet of drones in defense wireless communication
    Selvi, P. Tamil
    Sri, T. Santhi
    Rao, M. Nagabhushana
    Babu, B. S. S. V. Ramesh
    Rao, K. Venkateswara
    Srikanth, Abhiram
    SOFT COMPUTING, 2022, 26 (10) : 4905 - 4913
  • [9] An Offline Direct Authentication Scheme for the Internet of Medical Things Based on Elliptic Curve Cryptography
    Maarouf, Asmaa
    Sakr, Rasha
    Elmougy, Samir
    IEEE ACCESS, 2024, 12 : 134902 - 134925
  • [10] RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption
    Ali, Usman
    Bin Idris, Mohd Yamani Idna
    Bin Ayub, Mohamad Nizam
    Ullah, Insaf
    Ali, Ihsan
    Nandy, Tarak
    Yahuza, Muktar
    Khan, Nauman
    IEEE ACCESS, 2021, 9 : 49942 - 49959