Security-Enhanced Lightweight Authentication Key-Agreement Protocol for Unmanned Aerial Vehicle Communication

被引:1
作者
He, Zhoucan [1 ,2 ]
Zheng, Yilong [2 ]
Chen, Sisi [2 ]
Du, Zhongze [2 ]
Liu, Shuyuan [2 ]
Zhang, Kailong [1 ]
机构
[1] Northwestern Polytech Univ, Sch Software, Changan Campus, Xian 710129, Peoples R China
[2] China Acad Engn Phys, Inst Elect Engn, Mianyang 621000, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2025年 / 15卷 / 09期
基金
中国国家自然科学基金;
关键词
unmanned aerial vehicles; key-agreement protocol; security analysis; SCHEME; EFFICIENT;
D O I
10.3390/app15094680
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Unmanned aerial vehicles have been widely employed in recent years owing to their remarkable features such as low environmental requirements and high survivability, and a new tendency towards networking, intelligence, and collaboration has emerged. The realization of these novel capabilities requires a secure and efficient wireless communication channel; however, it is vulnerable to eavesdropping, forgery, and manipulation by attackers. Therefore, ensuring the security of the wireless communication between unmanned aerial vehicles and ground stations is an urgent issue. The traditional solution to this problem is to design an authenticated key-agreement protocol between unmanned aerial vehicles and ground stations. However, an analysis of existing representative methods has shown that these methods are computationally expensive and difficult to implement in resource-intensive aerial vehicles. Furthermore, existing key-agreement systems are highly dependent on the security of temporary session information. When the temporary session information is stolen, the attacker can obtain the session key for the current communication and perform information theft attacks. Therefore, a security-enhanced lightweight authenticated key-agreement protocol for unmanned aerial vehicles' communication is proposed in this study. We present a low-computational-cost agreement method that can achieve secure key agreement in cases of temporary session information leakage. Both theoretical analysis and experimental verification show that our proposed protocol has superior security properties and lower computational costs than representative protocols.
引用
收藏
页数:24
相关论文
共 32 条
[1]   Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :47-57
[2]   Provably secured lightweight authenticated key agreement protocol for modern health industry [J].
Abdussami, Mohammad ;
Amin, Ruhul ;
Vollala, Satyanarayana .
AD HOC NETWORKS, 2023, 141
[3]   Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure [J].
Adhikari, Sharmistha ;
Ray, Sangram ;
Obaidat, Mohammad S. ;
Biswas, G. P. .
COMPUTER COMMUNICATIONS, 2020, 157 :187-203
[4]  
Albeaino G, 2019, J INF TECHNOL CONSTR, V24, P381
[5]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[6]  
[Anonymous], 2008, Ubiquity, DOI DOI 10.1145/1386853.1378356
[7]  
Blanchet B., 2018, ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial
[8]   Public key versus symmetric key cryptography in client-server authentication protocols [J].
Braeken, An .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) :103-114
[9]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[10]   A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure [J].
Chaudhry, Shehzad Ashraf ;
Nebhan, Jamel ;
Yahya, Khalid ;
Al-Turjman, Fadi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) :5000-5006