Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

被引:37
作者
Wu, Tsuyang [1 ]
Guo, Xinglan [1 ]
Chen, Yehcheng [2 ]
Kumari, Saru [3 ]
Chen, Chienming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
authentication; Internet of Drones; 5G networks; cryptanalysis; lightweight; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; INTERNET; PRIVACY; ALGORITHM;
D O I
10.3390/drones6010010
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] A lightweight authentication scheme for 5G mobile communications: a dynamic key approach
    Pothumarti, Raghu
    Jain, Kurunandan
    Krishnan, Prabhakar
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [22] MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets
    Liu, Yibing
    Huo, Lijun
    Wu, Jun
    Guizani, Mohsen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3809 - 3827
  • [23] An enhanced anonymous authentication protocol for wireless sensor networks
    Li, Jiping
    Yu, Tong
    Wu, Yunyun
    Kong, Xia
    Liu, Shouyin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 35 (03) : 136 - 149
  • [24] Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks
    Khan, Shah Khalid
    Shiwakoti, Nirajan
    Stasinopoulos, Peter
    Warren, Matthew
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 154 - 158
  • [25] A Construction of Security Enhanced and Efficient Handover AKA Protocol in 5G Communication Network
    Sharma, Aditya
    Sharma, Ila
    Jain, Aaditya
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [26] A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1311 - 1316
  • [27] Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol
    Moatemri, Maroua
    Eltaief, Hamdi
    Youssef, Habib
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 993 - 998
  • [28] PPSE: Privacy Preservation and Security Efficient AKA Protocol for 5G Communication Networks
    Parne, Balu L.
    Gupta, Shubham
    Gandhi, Kaneesha
    Meena, Shubhangi
    2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [29] Enhanced Authentication and Key Agreement Protocol for Improving Security in UMTS Networks
    Ziani, Ahmed
    Medouri, Abdellatif
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 890 - 894
  • [30] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3682 - 3722