Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

被引:37
作者
Wu, Tsuyang [1 ]
Guo, Xinglan [1 ]
Chen, Yehcheng [2 ]
Kumari, Saru [3 ]
Chen, Chienming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
authentication; Internet of Drones; 5G networks; cryptanalysis; lightweight; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; INTERNET; PRIVACY; ALGORITHM;
D O I
10.3390/drones6010010
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [2] Amassing the Security: An Enhanced Authentication and Key AgreementProtocol for Remote Surgery in Healthcare Environment
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Kumari, Saru
    Pirouz, Matin
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 134 (01): : 317 - 341
  • [3] A security protocol for D2D communications in 5G networks using elliptic curve cryptography
    Kishore, R.
    Ioannou, I.
    Christophorou, C.
    Prabagarane, N.
    Vassiliou, V.
    Vignesh, S.
    Vinayak, H.
    Venkatesh, S.
    Pitsillides, A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) : 1389 - 1408
  • [4] A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    IEEE ACCESS, 2022, 10 : 57485 - 57498
  • [5] CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks
    Cabuk, Umut Can
    Dalkilic, Gokhan
    Dagdeviren, Orhan
    IEEE ACCESS, 2021, 9 : 78400 - 78414
  • [6] Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Argyriou, Antonios
    Kosmanos, Dimitrios
    Janicke, Helge
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 101 : 55 - 82
  • [7] An Enhanced Cross-Network-Slice Authentication Protocol for 5G
    Yadav, Awaneesh Kumar
    Wijethilaka, Shalitha
    Braeken, An
    Misra, Manoj
    Liyanage, Madhusanka
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2023, 8 (04): : 555 - 573
  • [8] A Proxy Signature-Based Drone Authentication in 5G D2D Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [9] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [10] A new authentication and key agreement protocol for 5G wireless networks
    Liu, Tian
    Wu, Fan
    Li, Xiong
    Chen, Chaoyang
    TELECOMMUNICATION SYSTEMS, 2021, 78 (03) : 317 - 329