A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones

被引:5
作者
Choi, Jihye [1 ]
Son, Seunghwan [1 ]
Kwon, Deokkyu [1 ]
Park, Youngho [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Drones; PUF; authentication; cryptanalysis; security; MANAGEMENT PROTOCOL; IOD; ISSUES;
D O I
10.3390/s25030982
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Drones (IoD) is an emerging industry that offers convenient services for humans due to the high mobility and flexibility of drones. The IoD substantially enhances human life by enabling diverse drone applications across various domains. However, a malicious adversary can attempt security attacks because communication within an IoD environment is conducted through public channels and because drones are vulnerable to physical attacks. In 2023, Sharma et al. proposed a physical unclonable function (PUF)-based authentication and key agreement (AKA) scheme for the IoD. Regrettably, we discover that their scheme cannot prevent impersonation, stolen verifier, and ephemeral secret leakage (ESL) attacks. Moreover, Sharma et al.'s scheme cannot preserve user untraceability and anonymity. In this paper, we propose a secure and lightweight AKA scheme which addresses the shortcomings of Sharma et al.'s scheme. The proposed scheme has resistance against diverse security attacks, including physical capture attacks on drones, by leveraging a PUF. Furthermore, we utilize lightweight operations such as hash function and XOR operation to accommodate the computational constraints of drones. The security of the proposed scheme is rigorously verified, utilizing "Burrows-Abadi-Needham (BAN) logic", "Real-or-Random (ROR) model", "Automated Validation of Internet Security Protocols and Application (AVISPA)", and informal analysis. Additionally, we compare the security properties, computational cost, communication cost, and energy consumption of the proposed scheme with other related works to evaluate performance. As a result, we determine that our scheme is efficient and well suited for the IoD.
引用
收藏
页数:26
相关论文
共 43 条
[31]   Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET [J].
Son, Seunghwan ;
Lee, Joonyoung ;
Park, Yohan ;
Park, Youngho ;
Das, Ashok Kumar .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (03) :1346-1358
[32]   An Intrusion Detection System for Drone Swarming Utilizing Timed Probabilistic Automata [J].
Subbarayalu, Venkatraman ;
Vensuslaus, Maria Anu .
DRONES, 2023, 7 (04)
[33]   EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet [J].
Sun, Yunqing ;
Cao, Jin ;
Ma, Maode ;
Zhang, Yinghui ;
Li, Hui ;
Niu, Ben .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :370-387
[34]   PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones [J].
Tanveer, Muhammad ;
Aldosary, Abdallah ;
Khokhar, Salah-ud-din ;
Das, Ashok Kumar ;
Aldossari, Saud Alhajaj ;
Chaudhry, Shehzad Ashraf .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) :9560-9574
[35]   SEAF-IoD: Secure and efficient user authentication framework for the Internet of Drones [J].
Tanveer, Muhammad ;
Aldosary, Abdallah ;
Kumar, Neeraj ;
Aldossari, Saud Alhajaj .
COMPUTER NETWORKS, 2024, 247
[36]   RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones [J].
Tanveer, Muhammad ;
Khan, Abd Ullah ;
Kumar, Neeraj ;
Hassan, Mohammad Mehedi .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) :1339-1353
[37]   Zipf's Law in Passwords [J].
Wang, Ding ;
Cheng, Haibo ;
Wang, Ping ;
Huang, Xinyi ;
Jian, Gaopeng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) :2776-2791
[38]   AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment [J].
Wazid, Mohammad ;
Bagga, Palak ;
Das, Ashok Kumar ;
Shetty, Sachin ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8804-8817
[39]   Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges [J].
Yahuza, Muktar ;
Idris, Mohd Yamani Idna ;
Ahmedy, Ismail Bin ;
Wahab, Ainuddin Wahid Abdul ;
Nandy, Tarak ;
Noor, Noorzaily Mohamed ;
Bala, Abubakar .
IEEE ACCESS, 2021, 9 (09) :57243-57270
[40]   A Review on Security Issues and Solutions of the Internet of Drones [J].
Yang, Wencheng ;
Wang, Song ;
Yin, Xuefei ;
Wang, Xu ;
Hu, Jiankun .
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 :96-110