共 44 条
An Enhanced Certificateless Blockchain-Assisted Authentication and Key Agreement Protocol for Internet of Drones
被引:1
作者:
Zhang, Jintian
[1
]
Chen, Xingxing
[1
]
Cheng, Qingfeng
[1
]
Chen, Xiaofeng
[1
,2
]
Luo, Xiangyang
[3
]
机构:
[1] Informat Engn Univ, Sch Cyber Sci & Technol, Zhengzhou 450001, Peoples R China
[2] Xidian Univ, Xian 710126, Peoples R China
[3] Key Lab Cyberspace Situat Awareness Henan Prov, Zhengzhou 450001, Peoples R China
来源:
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
|
2025年
/
12卷
/
04期
基金:
中国国家自然科学基金;
关键词:
Authentication;
Protocols;
Security;
Drones;
Blockchains;
Privacy;
Resistance;
Passwords;
Chebyshev approximation;
Chaotic communication;
Internet of Drones (IoD);
blockchain;
certificateless;
anonymous authentication;
LIGHTWEIGHT;
SCHEME;
SECURITY;
COMMUNICATION;
D O I:
10.1109/TNSE.2025.3556400
中图分类号:
T [工业技术];
学科分类号:
08 ;
摘要:
The consumer drone market has grown rapidly, making it necessary to integrate drones with the internet to explore low-altitude areas. Internet of Drones (IoD) offers a more potent data stream to connect the global Big Data system, it will also have to deal with the issue of exposure and malicious use of flight trajectory, communication data, and identity information when a cyber attacker unlawfully eavesdrops, gains access to, attacks, or even takes control of drones. Numerous authentication protocols have been developed for the IoD context in order to solve the aforementioned issues. Ali et al. provide a cross-domain communication scheme (henceforth known as the AJ protocol) in IoD environment by utilizing blockchain-assisted authentication to improve the security of IoD data transmission. Nevertheless, this scheme is vulnerable to key compromise impersonation attack and fails to achieve the crucial security attribute of anonymity. In order to address the aforementioned security concerns, we develop an enhanced certificateless authentication and key agreement (CL-AKA) protocol in IoD environment, based on blockchain technology and Chebyshev chaotic mapping. Our protocol can achieve necessary security attributes for IoD and withstand a variety of known attacks, as demonstrated by proof of security under the eCK model and automated validation by the Scyther tool. Additionally, our protocol performs better in terms of computation and communication overhead when compared to similar protocols to achieve lightweight anonymous authentication.
引用
收藏
页码:3065 / 3081
页数:17
相关论文