A secure and lightweight batch authentication scheme for Internet of Drones environment

被引:2
作者
Zhang, Yuanyuan [1 ]
Meng, Lingzhe [1 ]
Zhang, Mingwu [1 ]
Meng, Weizhi [2 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan, Peoples R China
[2] Tech Univ Denmark, Dept Appl Math & Comp Sci, Lyngby, Copenhagen Regi, Denmark
基金
中国国家自然科学基金;
关键词
Internet of Drones (IoD); Batch authentication; One-to-many; PUFs; Key agreement; KEY AGREEMENT SCHEME; PHYSICAL UNCLONABLE FUNCTIONS; PROTOCOL; DESIGN;
D O I
10.1016/j.vehcom.2023.100680
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Drones (IoD) ushered in a rapid growth period and is gradually expanded from military field to civilian field. Currently, there are more and more scenarios where multiple drones are needed to complete a task together. Usually, identity authentication is required to ensure the execution of the task. The existing authentication schemes are basically aimed at the authentication of a single drone. For the multiple-drones scenario, the authentication protocol needs to be executed one by one for all the participating drones, which is extremely inefficient and will directly affect the efficiency of task execution. Therefore, we propose a novel lightweight authentication scheme, which supports users' batch authentication of multiple drones to ensure high efficiency of authentication. In our scheme, we only use hash function and point multiplication to complete batch authentication. In addition, Physical Unclonable Functions (PUFs) are introduced into our scheme to resist physical capture attack. Furthermore, our formal and informal security analyses reveal that our scheme can withstand most known attacks. The experimental result shows that our scheme can provide better security and lower storage and computation overheads when authenticating multiple drones, as compared with existing similar schemes.
引用
收藏
页数:11
相关论文
共 43 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
    Alladi, Tejasvi
    Bansal, Gaurang
    Chamola, Vinay
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15068 - 15077
  • [3] UAV assistance paradigm: State-of-the-art in applications and challenges
    Alzahrani, Bander
    Oubbati, Omar Sami
    Barnawi, Ahmed
    Atiquzzaman, Mohammed
    Alghazzawi, Daniyal
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 166
  • [4] Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Kumar, Neeraj
    Lorenz, Pascal
    Alazab, Mamoun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 9097 - 9111
  • [5] A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
    Chamola, Vinay
    Kotesh, Pavan
    Agarwal, Aayush
    Naren
    Gupta, Navneet
    Guizani, Mohsen
    [J]. AD HOC NETWORKS, 2021, 111 (111)
  • [6] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [7] Elliptic curve cryptography engineering
    Cilardo, A
    Coppolino, L
    Mazzocca, N
    Romano, L
    [J]. PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 395 - 406
  • [8] RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks
    Cui, Jie
    Zhang, Xiaoyu
    Zhong, Hong
    Ying, Zuobin
    Liu, Lu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 6417 - 6428
  • [9] Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
    Delvaux, Jeroen
    Gu, Dawu
    Verbauwhede, Ingrid
    Hiller, Matthias
    Yu, Meng-Day
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 412 - 431
  • [10] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523