Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

被引:37
作者
Wu, Tsuyang [1 ]
Guo, Xinglan [1 ]
Chen, Yehcheng [2 ]
Kumari, Saru [3 ]
Chen, Chienming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
authentication; Internet of Drones; 5G networks; cryptanalysis; lightweight; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; INTERNET; PRIVACY; ALGORITHM;
D O I
10.3390/drones6010010
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks
    Zhang, Jing
    Cui, Jie
    Zhong, Hong
    Bolodurina, Irina
    Liu, Lu
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04): : 2982 - 2994
  • [32] An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Obaidat, Mohammad S.
    Kumari, Saru
    Kumar, Sachin
    Chen, Chien-Ming
    IEEE ACCESS, 2020, 8 : 28096 - 28108
  • [33] Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
    Fan, Kai
    Gong, Yuanyuan
    Liang, Chen
    Li, Hui
    Yang, Yintang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3095 - 3104
  • [34] An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks
    Huang, Haiou
    Hu, Liang
    Chu, Jianfeng
    Cheng, Xiaochun
    IEEE ACCESS, 2019, 7 : 175970 - 175979
  • [35] On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
    Park, Kisung
    Park, Youngho
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [36] Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks
    Braeken, An
    Liyanage, Madhusanka
    Kumar, Pardeep
    Murphy, John
    IEEE ACCESS, 2019, 7 : 64040 - 64052
  • [37] Lega: A lightweight and efficient group authentication protocol for massive machine type communication in 5g networks
    Basudan S.
    Journal of Communications and Information Networks, 2020, 5 (04) : 89 - 98
  • [38] A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks
    Shang, Zhengyi
    Ma, Maode
    Li, Xiaohong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (11) : 7021 - 7032
  • [39] Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain
    Liu, Jian
    Huang, Chin-Tser
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [40] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,