Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

被引:37
作者
Wu, Tsuyang [1 ]
Guo, Xinglan [1 ]
Chen, Yehcheng [2 ]
Kumari, Saru [3 ]
Chen, Chienming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
authentication; Internet of Drones; 5G networks; cryptanalysis; lightweight; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; INTERNET; PRIVACY; ALGORITHM;
D O I
10.3390/drones6010010
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Practical and secure multifactor authentication protocol for autonomous vehicles in 5G
    Miao, Junfeng
    Wang, Zhaoshun
    Ning, Xin
    Xiao, Nan
    Cai, Weiwei
    Liu, Ruimin
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10) : 1852 - 1869
  • [42] Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
    Yu, SungJin
    Lee, JoonYoung
    Lee, KyungKeun
    Park, KiSung
    Park, YoungHo
    SENSORS, 2018, 18 (10)
  • [43] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [44] Secure and effective authentication for 5G networks (SEA-5G) using blockchain
    R. Bala
    R. Manoharan
    Journal of Ambient Intelligence and Humanized Computing, 2025, 16 (1) : 51 - 66
  • [45] Overview of 5G security technology
    Ji, Xinsheng
    Huang, Kaizhi
    Jin, Liang
    Tang, Hongbo
    Liu, Caixia
    Zhong, Zhou
    You, Wei
    Xu, Xiaoming
    Zhao, Hua
    Wu, Jiangxing
    Yi, Ming
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (08)
  • [46] Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks
    Tang, Jie
    Wen, Hong
    Zeng, Kai
    Liao, Run-fa
    Pan, Fei
    Hu, Lin
    IEEE NETWORK, 2019, 33 (05): : 126 - 133
  • [47] Enhanced Authentication Protocol for Wibro Networks
    Lee, Choonghun
    Chae, Hyunsu
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (09): : 37 - 41
  • [48] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [49] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
    Wu, Tsu-Yang
    Kong, Fangfang
    Meng, Qian
    Kumari, Saru
    Chen, Chien-Ming
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [50] Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks
    Fang, He
    Wang, Xianbin
    Tomasin, Stefano
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 55 - 61