Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones

被引:3
作者
Lee, Tian-Fu [1 ]
Lou, Der-Chyuan [2 ,3 ]
Chang, Chien-Hung [3 ,4 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien, Taiwan
[2] Chang Gung Univ, Dept Comp Sci & Informat Engn, ROC, Taoyuan, Taiwan
[3] Chang Gung Mem Hosp Linkou, Stroke Ctr, Dept Neurol, Taoyuan, Taiwan
[4] Chang Gung Univ, Coll Med, Taoyuan, Taiwan
关键词
Authentication; Key agreement; Internet of Drones; Network security; SCHEME; DESIGN;
D O I
10.1016/j.iot.2023.100877
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement for Internet of Drones (IoD) enables mobile users to remotely access a group of drones for secure and efficient services, including the transportation of supplies, the transmission of surveillance data and images, the provision of communication services, etc. Recently, several lightweight authenticated key agreement protocols were developed for IoD to address security problems of previous studies, and showed that the security of their protocols were formally proved and their protocols can resist possible attacks. However, this investigation demonstrates the security weaknesses of a previous protocol, which may lead to their scheme lacking user privacy protection, violating session key security, and unable to withstand impersonation attacks, and develops an enhanced protocol by adopting dynamic identities and ensuring message freshness. The enhanced protocol is proved the security using formal proofs and secure against possible attacks. Compared with related protocols, the enhanced protocol solves the previous weaknesses, provides more security requirements, and increased the overall performance by about 28.4%.
引用
收藏
页数:15
相关论文
共 25 条
  • [1] Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods
    Abdulzahra, Ali Mohammed Kadhim
    Al-Qurabat, Ali Kadhum M.
    Abdulzahra, Suha Abdulhussein
    [J]. INTERNET OF THINGS, 2023, 22
  • [2] Abdulzahra AM., 2022, Karbala Int J Modern Sci, V8, P579, DOI [10.33640/2405-609x.3259, DOI 10.33640/2405-609X.3259]
  • [3] Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
    Aggarwal, Shubhani
    Kumar, Neeraj
    [J]. COMPUTER COMMUNICATIONS, 2020, 149 : 270 - 299
  • [4] Al-qurabat A., 2022, International Journal of Computing and Digital System, V11, P117
  • [5] Al-Qurabat Ali Kadhum M., 2020, IOP Conference Series: Materials Science and Engineering, V928, DOI 10.1088/1757-899X/928/3/032055
  • [6] Al-Qurabat AKM, 2022, INT J COMPUT APPL T, V68, P357, DOI [10.1504/IJCAT.2022.10050317, 10.1504/IJCAT.2022.125182]
  • [7] Data Traffic Management Based on Compression and MDL Techniques for Smart Agriculture in IoT
    Al-Qurabat, Ali Kadhum M.
    Mohammed, Zahraa A.
    Hussein, Zahraa Jabbar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (03) : 2227 - 2258
  • [8] Authentication and Delegation for Operating a Multi-Drone System
    Bae, Mungyu
    Kim, Hwangnam
    [J]. SENSORS, 2019, 19 (09)
  • [9] Bassem W., 2022, International Conference for Natural and Applied Sciences (ICNAS), V2022, P23, DOI [10.1109/ICNAS55512.2022.9944716, DOI 10.1109/ICNAS55512.2022.9944716]
  • [10] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13