A Lightweight Authentication Protocol for UAVs Based on ECC Scheme

被引:6
作者
Zhang, Shuo [1 ]
Liu, Yaping [1 ]
Han, Zhiyu [1 ]
Yang, Zhikai [1 ]
机构
[1] Guangzhou Univ, CIAT, Guangzhou 510006, Peoples R China
关键词
UAV; internet of drones; authentication protocol; key agreement; 2-FACTOR AUTHENTICATION; INTERNET; COMMUNICATION; NETWORKS;
D O I
10.3390/drones7050315
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention. Due to open-access communication environments, UAVs may raise security concerns, including authentication threats as well as the leakage of location and other sensitive data to unauthorized entities. Elliptic curve cryptography (ECC) is widely favored in authentication protocol design due to its security and performance. However, we found it still has the following two problems: inflexibility and a lack of backward security. This paper proposes an ECC-based identity authentication protocol LAPEC for UAVs. LAPEC can guarantee the backward secrecy of session keys and is more flexible to use. The time cost of LAPEC was analyzed, and its overhead did not increase too much when compared with other authentication methods.
引用
收藏
页数:16
相关论文
共 39 条
  • [1] A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems
    Alzahrani B.A.
    Barnawi A.
    Chaudhry S.A.
    [J]. Security and Communication Networks, 2021, 2021
  • [2] SHOTS: Scalable Secure Authentication-Attestation Protocol Using Optimal Trajectory in UAV Swarms
    Bansal, Gaurang
    Naren
    Chamola, Vinay
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (06) : 5827 - 5836
  • [3] S-MAPS: Scalable Mutual Authentication Protocol for Dynamic UAV Swarms
    Bansal, Gaurang
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) : 12088 - 12100
  • [4] Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
    Chang, I-Pin
    Lee, Tian-Fu
    Lin, Tsung-Hung
    Liu, Chuan-Ming
    [J]. SENSORS, 2015, 15 (12) : 29841 - 29854
  • [5] Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
    Chatterjee, Santanu
    Roy, Sandip
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 824 - 839
  • [6] On Post-Compromise Security
    Cohn-Gordon, Katriel
    Cremers, Cas
    Garratt, Luke
    [J]. 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 164 - 178
  • [7] A smart lightweight privacy preservation scheme for IoT-based UAV communication systems
    Deebak, B. D.
    Al-Turjman, Fadi
    [J]. COMPUTER COMMUNICATIONS, 2020, 162 : 102 - 117
  • [8] A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications
    Ever, Yoney Kirsal
    [J]. COMPUTER COMMUNICATIONS, 2020, 155 : 143 - 149
  • [9] A provably secure authentication scheme for RFID-enabled UAV applications
    Gope, Prosanta
    Millwood, Owen
    Saxena, Neetesh
    [J]. COMPUTER COMMUNICATIONS, 2021, 166 : 19 - 25
  • [10] An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones
    Gope, Prosanta
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13621 - 13630