Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing

被引:22
作者
Tanveer, Muhammad [1 ]
Khan, Abd Ullah [2 ]
Nguyen, Tu N. [3 ]
Ahmad, Musheer [4 ]
El-Latif, Ahmed A. Abd [5 ,6 ]
机构
[1] GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23640, Pakistan
[2] Natl Univ Sci & Technol, Dept Comp Sci, Balochistan Campus, Islamabad 44000, Pakistan
[3] Kennesaw State Univ, Dept Comp Sci, Marietta, GA 30060 USA
[4] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[5] Prince Sultan Univ, Coll Comp & Informat Sci, EIAS Data Sci Lab, Riyadh 11586, Saudi Arabia
[6] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm 32511, Egypt
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 05期
关键词
Drones; Authentication; Real-time systems; Hash functions; Communication channels; Privacy; Internet; Internet of drones; key Exchange; security; AEAD; privacy; authentication; KEY AGREEMENT SCHEME; ANONYMOUS AUTHENTICATION SCHEME; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; 3-FACTOR AUTHENTICATION; PROTOCOL; PRIVACY; DESIGN; IOT;
D O I
10.1109/TNSE.2022.3151843
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In Internet of Drones (IoD), unmanned aerial vehicles (UAVs) or drones are deployed in various mission-critical applications to collect sensitive data and disseminate it to the server placed on the ground station. Users mostly require real-time data from the drones, instead of the information stored by the server, in specific applications to perform timely actions. However, performing real-time communication with a drone through the public communication channel, which is exposed to different security risks, mandates an authenticated key exchange (AKE) between users and drones in the IoD networks for enabling users to communicate securely with the drone through the public communication infrastructure. Moreover, real-time data acquisition from drones brings about computational overheads, making the process computationally inefficient. Thus, an efficient and lightweight AKE scheme is imperative. This article proposes a resource-efficient authentication scheme for the IoD networks, called REAS-IoD, which utilizes the lightweight hash function and authenticated encryption primitive, known as ACE, to accomplish the AKE process securely. In REAS-IoD, a user's authentication is performed, followed by establishing a secure session key (SK) between a specific drone and the user, for the future encrypted communication. The SK's security is established utilizing a random oracle model. We, by performing informal security verification, prove that REAS-IoD is cable of obviating different active and passive pernicious security attacks. Besides, we conduct a Scyther tool-based analysis of REAS-IoD to corroborate its security strength. Lastly, a comparative study is presented to demonstrate that without compromising security and privacy features, REAS-IoD requires fewer resource, and is computationally efficient, than the related eminent security schemes.
引用
收藏
页码:3058 / 3070
页数:13
相关论文
共 67 条
[1]  
Aagaard M, 2019, Submission to NIST LwC Standardization Process
[2]   A secure remote user authentication scheme for 6LoWPAN-based Internet of Things [J].
Abbas, Ghulam ;
Tanveer, Muhammad ;
Abbas, Ziaul Haq ;
Waqas, Muhammad ;
Baker, Thar ;
Obe, Dhiya Al-Jumeily .
PLOS ONE, 2021, 16 (11)
[3]   General classification of the authenticated encryption schemes for the CAESAR competition [J].
Abed, Farzaneh ;
Forler, Christian ;
Lucks, Stefan .
COMPUTER SCIENCE REVIEW, 2016, 22 :13-26
[4]   Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks [J].
Adavoudi-Jolfaei, AmirHosein ;
Ashouri-Talouki, Maede ;
Aghili, Seyed Farhad .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) :43-59
[5]   ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments [J].
Ali, Zeeshan ;
Hussain, Sajid ;
Rehman, Rana Haseeb Ur ;
Munshi, Asmaa ;
Liaqat, Misbah ;
Kumar, Neeraj ;
Chaudhry, Shehzad Ashraf .
IEEE ACCESS, 2020, 8 :107993-108003
[6]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[7]   An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN [J].
Alotaibi, Majid .
IEEE ACCESS, 2018, 6 :70072-70087
[8]   An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :133-144
[9]   An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Park, Youngho .
SENSORS, 2020, 20 (04)
[10]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752