A PUF-based lightweight authentication and key agreement protocol for smart UAV networks

被引:33
作者
Zhang, Li [1 ]
Xu, Jianbo [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ]
Li, Xiong [5 ]
Vijayakumar, Pandi [6 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
[2] Univ Jordan, KASIT, Amman, Jordan
[3] Univ Sci & Technol Beijing, Beijing, Peoples R China
[4] IIT Dhanbad, Dhanbad 826004, Bihar, India
[5] Univ Elect Sci & Technol China, Inst Cyber Secur, Sch Comp Sci & Engn, Chengdu, Peoples R China
[6] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, Tamil Nadu, India
关键词
WIRELESS SENSOR NETWORKS; ANONYMOUS MUTUAL AUTHENTICATION; USER AUTHENTICATION; MOBILE-SINK; SCHEME; INTERNET; SECURE; SURVEILLANCE; FRAMEWORK;
D O I
10.1049/cmu2.12295
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the advancement of information technology and the reduction of costs, the application of unmanned aerial vehicle (UAV) has gradually expanded from the military field to the industrial field and civilian field. It brings great convenience to people in surveillance, detection, transportation, emergency rescue etc. However, UAVs usually work in harsh natural environments, and their communication security confronts various challenges. Due to UAVs' limited resources, such as computing capability, storage space, and energy, traditional security protection schemes based on complex cryptographic algorithms are not suitable for UAV systems directly. Therefore, a two-stage lightweight identity authentication and key agreement protocol for UAV is proposed in this paper. The entire process only uses hash and XOR operations, which significantly improves the authentication efficiency. Simultaneously, the physical unclonable function (PUF) is introduced and embedded into the UAV hardware to ensure UAV network communication security when a UAV suffers a physical capture attack. In the paper, the security of the proposed protocol is proved with Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and AVISPA simulation tools. An informal security analysis is also provided to illustrate that the protocol satisfies the security requirements of UAV networks. Finally, the protocol is compared with other existing protocols regarding function properties, computation cost, and communication cost, which shows that the proposed protocol has effectiveness and practicality.
引用
收藏
页码:1142 / 1159
页数:18
相关论文
共 57 条
  • [1] An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks
    Adil, Muhammad
    Almaiah, Mohammed Amin
    Alsayed, Alhuseen Omar
    Almomani, Omar
    [J]. SENSORS, 2020, 20 (08)
  • [2] MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks
    Adil, Muhammad
    Khan, Rahim
    Almaiah, Mohammed Amin
    Al-Zahrani, Mohammed
    Zakarya, Muhammad
    Amjad, Muhammad Saeed
    Ahmed, Rehan
    [J]. IEEE ACCESS, 2020, 8 (08): : 44459 - 44469
  • [3] Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks
    Al-Turjman, Fadi
    Ever, Yoney Kirsal
    Ever, Enver
    Nguyen, Huan X.
    David, Deebak Bakkiam
    [J]. IEEE ACCESS, 2017, 5 : 24617 - 24631
  • [4] Ali J, 2020, I C INF COMM TECH CO, P515, DOI 10.1109/ICTC49870.2020.9289504
  • [5] Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Ramzan, Muhammad Sher
    Al-Turjman, Fadi
    [J]. IEEE ACCESS, 2020, 8 : 43711 - 43724
  • [6] SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
    Alladi, Tejasvi
    Bansal, Gaurang
    Chamola, Vinay
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15068 - 15077
  • [7] PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks
    Alladi, Tejasvi
    Chamola, Vinay
    Naren
    Kumar, Neeraj
    [J]. COMPUTER COMMUNICATIONS, 2020, 160 (160) : 81 - 90
  • [8] Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Leng, Lu
    Kumar, Neeraj
    [J]. COMPUTER NETWORKS, 2016, 101 : 42 - 62
  • [9] Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2019, 7 : 85627 - 85644
  • [10] A PUF-based mutual authentication scheme for Cloud-Edges IoT systems
    Barbareschi, Mario
    De Benedictis, Alessandra
    La Montagna, Erasmo
    Mazzeo, Antonino
    Mazzocca, Nicola
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 246 - 261