An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network

被引:35
作者
Yahuza, Muktar [1 ,2 ]
Idris, Mohd Yamani Idna [1 ,3 ]
Wahab, Ainuddin Wahid Abdul [1 ]
Nandy, Tarak [1 ]
Ahmedy, Ismail Bin [1 ]
Ramli, Roziana [1 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Yobe State Univ, Dept Comp Sci, Fac Sci, Damaturu 620242, Nigeria
[3] Univ Malaya, Ctr Res Mobile Cloud Comp, Kuala Lumpur 50603, Malaysia
关键词
Drones; Authentication; Elliptic curve cryptography; Internet of Things; Public key; Hash functions; Smart grids; Authenticated key agreement; CK adversarial model; certificateless AKA; elliptic curve cryptography; Internet of Drones; mobile edge computing; ProVerif; UAS; UAV; KEY AGREEMENT SCHEME; USER AUTHENTICATION; DESIGN;
D O I
10.1109/ACCESS.2021.3060420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy are among the most critical challenges on the internet of drones (IoD) network. The communication entities of the IoD network can communicate securely with the use of authenticated key agreement (AKA) based techniques. However, the design of such techniques must balance the tradeoff between security and lightweight features. Recently, Chen et al. proposed an authentication and key sharing scheme for IoD deployment. It is, however, realized after scrutiny that the proposed technique is vulnerable to security attacks under the well-accepted Canetti-Krawczyk (CK) adversary model. Moreover, the scheme applies to the IoD network with only one drones' flying zone. To solve these challenges, this paper proposed a secure lightweight proven authenticated key agreement (SLPAKA) technique for IoD deployment. The technique is free from all the problems identified in the scheme of Chen et al. To ensure the reliability of the SLPAKA, the security of the technique has been assessed from a theoretical method and formal way using the ProVerif cryptographic protocol verification tool. Apart from comparing the performance of SLPAKA with the benchmarking schemes in terms of security, computational cost, and communication cost, the SLPAKA and the technique proposed by Chen et al. are implemented using a python programming language to evaluate and compare their performance in terms of energy consumption and computational time metrics. The results show that the SLPAKA outperforms the technique of Chen et al. and all the other benchmarking techniques in terms of security and lightweight features.
引用
收藏
页码:31420 / 31440
页数:21
相关论文
共 50 条
  • [31] Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment
    Ali, Usman
    Bin Idris, Mohd Yamani Idna
    Frnda, Jaroslav
    Bin Ayub, Mohamad Nizam
    Khan, Muhammad Asghar
    Khan, Nauman
    Beegum, T. Rehannara
    Jasim, Ahmed A.
    Ullah, Insaf
    Babar, Mohammad
    INTERNET OF THINGS, 2023, 24
  • [32] A secure lightweight anonymous elliptic curve cryptography-based authentication and key agreement scheme for fog assisted-Internet of Things enabled networks
    Verma, Upendra
    Bhardwaj, Diwakar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23)
  • [33] A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones
    Choi, Jihye
    Son, Seunghwan
    Kwon, Deokkyu
    Park, Youngho
    SENSORS, 2025, 25 (03)
  • [34] CLAACS-IOD: Certificate-embedded lightweight authentication and access control scheme for Internet of Drones
    Sadhukhan, Dipanwita
    Ray, Sangram
    Dasgupta, Mou
    Rodrigues, Joel J. P. C.
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10) : 1972 - 2006
  • [35] SECURE: Secure and Efficient Protocol Using Randomness and Edge-Computing for Drone-Assisted Internet of Vehicles
    Sikarwar, Himani
    Vasudev, Harsha
    Das, Debasis
    Conti, Mauro
    Mondal, Koustav Kumar
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (06): : 6974 - 6988
  • [36] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [37] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12) : 13893 - 13914
  • [38] A lightweight biometric-assisted authentication approach for internet of things
    Kamal Rahmani
    Shahram Babaie
    Peer-to-Peer Networking and Applications, 2025, 18 (4)
  • [39] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [40] Lightweight Authentication and Secure Communication Suitable for IoT Devices
    Buchovecka, Simona
    Lorencz, Robert
    Bucek, Jiri
    Kodytek, Filip
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 75 - 83