REHAS: Robust and Efficient Hyperelliptic Curve-Based Authentication Scheme for Internet of Drones

被引:0
作者
Pratap, Bhanu [1 ]
Singh, Ayush [1 ]
Mehra, Pawan Singh [1 ]
机构
[1] Delhi Technol Univ, Dept CSE, New Delhi, India
关键词
authentication; HECC; internet of drones; Scyther; security; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; SECURE; PROTOCOL; SURVEILLANCE; BLOCKCHAIN; PRIVACY;
D O I
10.1002/cpe.8333
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Internet of Drones (IoD) is one of the most beneficial and has many versatile applications like Surveillance and Security, Delivery and Logistics, Environmental Monitoring, Agriculture, and so forth. The IoD network is crucial for collecting sensitive data like geo-coordinates, vehicle traffic data, and property details while surveying the various deployment locations in smart cities. The communication between users and drones can be compromised over insecure wireless channels by multiple attacks such as Man-in-the-middle-attack, Denial of Service, and so forth. Many schemes have already been propounded in the field of IoD. Still, many of them cannot address the resource constraints problem of drones, and existing protocols have higher computation and communication costs. Therefore, this paper has proposed a robust and efficient Hyper-Elliptic Curve-based authentication scheme (REHAS), which provides a session key for secure communication. Artificial Identities are generated using a hash function and random numbers. Fuzzy Extractor is used for user biometric authentication, which makes the smart device secure when lost. HECC is used with a smaller bit size of 80 bits rather than ECC of 160 bits. The security of the REHAS has been ensured using Scyther simulation. Furthermore, the resilience, safety, and robustness of REHAS are ensured by Informal security analysis. Lastly, a comparative study of the REHAS has been performed with other related Authentication and key agreement (AKA) protocols regarding communication cost, Computation cost, and security features, demonstrating that REHAS incurred less computation cost (6.7171 ms), communication overhead (1696 bits), and energy consumption (22.5 mJ) than other existing AKA schemes.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] SEAF-IoD: Secure and efficient user authentication framework for the Internet of Drones
    Tanveer, Muhammad
    Aldosary, Abdallah
    Kumar, Neeraj
    Aldossari, Saud Alhajaj
    COMPUTER NETWORKS, 2024, 247
  • [22] SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
    El-Zawawy, Mohamed A.
    Brighente, Alessandro
    Conti, Mauro
    COMPUTER NETWORKS, 2022, 206
  • [23] An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 198 - 206
  • [24] Blockchain-Based Batch Authentication Scheme for Internet of Vehicles
    Shen, Huimin
    Wang, Taochun
    Chen, Jian
    Tao, Yuan
    Chen, Fulong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (06) : 7866 - 7879
  • [25] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Ostad-Sharif, Arezou
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (01)
  • [26] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) : 75 - 94
  • [27] Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones
    Tian, Yifan
    Yuan, Jiawei
    Song, Houbing
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [28] An Efficient Mutual Authentication Scheme for Internet of Things
    Mbarek, Bacem
    Ge, Mouzhi
    Pitner, Tomas
    INTERNET OF THINGS, 2020, 9
  • [29] An Efficient Certificateless Authentication Scheme for Satellite Internet
    Liu, Tongwei
    Zhao, Baokang
    Peng, Wei
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 331 - 338
  • [30] An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
    Moghadam, Mostafa Farhadi
    Nikooghadam, Mahdi
    Al Jabban, Maytham Azhar Baqer
    Alishahi, Mohammad
    Mortazavi, Leili
    Mohajerzadeh, Amirhossein
    IEEE ACCESS, 2020, 8 : 73182 - 73192