A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones

被引:1
作者
Choi, Jihye [1 ]
Son, Seunghwan [1 ]
Kwon, Deokkyu [1 ]
Park, Youngho [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Drones; PUF; authentication; cryptanalysis; security; MANAGEMENT PROTOCOL; IOD; ISSUES;
D O I
10.3390/s25030982
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Drones (IoD) is an emerging industry that offers convenient services for humans due to the high mobility and flexibility of drones. The IoD substantially enhances human life by enabling diverse drone applications across various domains. However, a malicious adversary can attempt security attacks because communication within an IoD environment is conducted through public channels and because drones are vulnerable to physical attacks. In 2023, Sharma et al. proposed a physical unclonable function (PUF)-based authentication and key agreement (AKA) scheme for the IoD. Regrettably, we discover that their scheme cannot prevent impersonation, stolen verifier, and ephemeral secret leakage (ESL) attacks. Moreover, Sharma et al.'s scheme cannot preserve user untraceability and anonymity. In this paper, we propose a secure and lightweight AKA scheme which addresses the shortcomings of Sharma et al.'s scheme. The proposed scheme has resistance against diverse security attacks, including physical capture attacks on drones, by leveraging a PUF. Furthermore, we utilize lightweight operations such as hash function and XOR operation to accommodate the computational constraints of drones. The security of the proposed scheme is rigorously verified, utilizing "Burrows-Abadi-Needham (BAN) logic", "Real-or-Random (ROR) model", "Automated Validation of Internet Security Protocols and Application (AVISPA)", and informal analysis. Additionally, we compare the security properties, computational cost, communication cost, and energy consumption of the proposed scheme with other related works to evaluate performance. As a result, we determine that our scheme is efficient and well suited for the IoD.
引用
收藏
页数:26
相关论文
共 43 条
[1]  
Gharibi M., Boutaba R., Waslander S.L., Internet of drones, IEEE Access, 4, pp. 1148-1162, (2016)
[2]  
Yang W., Wang S., Yin X., Wang X., Hu J., A review on security issues and solutions of the internet of drones, IEEE Open J. Comput. Soc, 3, pp. 96-110, (2022)
[3]  
Abualigah L., Diabat A., Sumari P., Gandomi A.H., Applications, deployments, and integration of internet of drones (iod): A review, IEEE Sens. J, 21, pp. 25532-25546, (2021)
[4]  
Mahmood K., Ghaffar Z., Nautiyal L., Akram M.W., Das A.K., Alenazi M.J., A Privacy-Preserving Access Control Protocol for Consumer Flying Vehicles in Smart City Applications, IEEE Internet Things J, 12, pp. 978-985, (2024)
[5]  
Alzahrani A.A., VSKAP-IoD: A Verifiably Secure Key Agreement Protocol for Securing IoD Environment, IEEE Access, 12, pp. 58039-58056, (2024)
[6]  
Mishra D., Singh M., Rewal P., Pursharthi K., Kumar N., Barnawi A., Rathore R.S., Quantum-safe secure and authorized communication protocol for internet of drones, IEEE Trans. Veh. Technol, 72, pp. 16499-16507, (2023)
[7]  
Yahuza M., Idris M.Y.I., Ahmedy I.B., Wahab A.W.A., Nandy T., Noor N.M., Bala A., Internet of drones security and privacy issues: Taxonomy and open challenges, IEEE Access, 9, pp. 57243-57270, (2021)
[8]  
Son S., Lee J., Park Y., Park Y., Das A.K., Design of blockchain-based lightweight V2I handover authentication protocol for VANET, IEEE Trans. Netw. Sci. Eng, 9, pp. 1346-1358, (2022)
[9]  
Prajapat S., Gautam D., Kumar P., Jangirala S., Das A.K., Park Y., Lorenz P., Secure lattice-based aggregate signature scheme for vehicular Ad Hoc networks, IEEE Trans. Veh. Technol, 73, pp. 12370-12384, (2024)
[10]  
Irshad A., Alzahrani B.A., Albeshri A., Alsubhi K., Nayyar A., Chaudhry S.A., SPAKE-DC: A secure PUF enabled authenticated key exchange for 5G-based drone communications, IEEE Trans. Veh. Technol, 73, pp. 5770-5780, (2024)