Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments

被引:14
|
作者
Park, Yohan [1 ]
Ryu, Daeun [1 ]
Kwon, Deokkyu [2 ]
Park, Youngho [2 ]
机构
[1] Keimyung Univ, Sch Comp Engn, Daegu 42601, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
关键词
AVISPA; BAN logic; Internet of Drones; mutual authentication; PUF; LIGHTWEIGHT; DESIGN; PROTOCOL; SURVEILLANCE; EXCHANGE; PRIVACY; SYSTEM;
D O I
10.3390/s23042034
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted from stolen mobile devices of remote users. Moreover, drones are susceptible to physical capture and manipulation by adversaries, which are called drone capture attacks. Thus, the development of a secure and lightweight authentication scheme is essential to overcoming these security vulnerabilities, even on resource-constrained drones. In 2021, Akram et al. proposed a secure and lightweight user-drone authentication scheme for drone networks. However, we discovered that Akram et al.'s scheme is susceptible to user and drone impersonation, verification table leakage, and denial of service (DoS) attacks. Furthermore, their scheme cannot provide perfect forward secrecy. To overcome the aforementioned security vulnerabilities, we propose a secure mutual authentication and key agreement scheme between user and drone pairs. The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. Moreover, the proposed scheme uses a fuzzy extractor to utilize the biometrics of users as secret parameters. We analyze the security of the proposed scheme using informal security analysis, Burrows-Abadi-Needham (BAN) logic, a Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. We also compared the security features and performance of the proposed scheme and the existing related schemes. Therefore, we demonstrate that the proposed scheme is suitable for IoD environments that can provide users with secure and convenient wireless communications.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones
    Choi, Jihye
    Son, Seunghwan
    Kwon, Deokkyu
    Park, Youngho
    SENSORS, 2025, 25 (03)
  • [2] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [3] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Xu, Dongqing
    Zhang, Shu
    Chen, Jianhua
    Ma, Mimi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 837 - 847
  • [4] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Dongqing Xu
    Shu Zhang
    Jianhua Chen
    Mimi Ma
    Peer-to-Peer Networking and Applications, 2018, 11 : 837 - 847
  • [5] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [6] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    ChinaCommunications, 2023, 20 (05) : 198 - 216
  • [7] A lightweight authentication and key agreement scheme for Internet of Drones
    Zhang, Yunru
    He, Debiao
    Li, Li
    Chen, Biwen
    COMPUTER COMMUNICATIONS, 2020, 154 : 455 - 464
  • [8] A probably secure biometric-based authentication and key agreement scheme for Internet of Drones
    Gautam, Deepika
    Rana, Aryan
    Obaidat, Mohammad S.
    Kumar, Pankaj
    Prajapat, Sunil
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (01):
  • [9] A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Islam, S. K. Hafizul
    Moghadam, Mostafa Farhadi
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 115
  • [10] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)