A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance

被引:88
作者
Nikooghadam, Mahdi [1 ]
Amintoosi, Haleh [1 ]
Islam, S. K. Hafizul [2 ]
Moghadam, Mostafa Farhadi [3 ]
机构
[1] Ferdowsi Univ Mashhad, Fac Engn, Mashhad, Razavi Khorasan, Iran
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani, W Bengal, India
[3] Vahdat Inst Higher Educ, Dept Comp Sci, Torbat E Jam, Iran
关键词
Authentication; Internet-of-Drones; Key agreement; Security; Scyther; KEY AGREEMENT SCHEME; USER AUTHENTICATION; IOT; PROTOCOL; COMMUNICATION; MECHANISM; NETWORKS; DESIGN;
D O I
10.1016/j.sysarc.2020.101955
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart cities are made of different interconnected components that exchange data and facilitate the urban living for citizens. Unmanned Aerial Vehicles, known as drones, are components used in various civilian applications, such as agriculture, package delivery, and surveillance. To enhance drone?s flying safety and quality of service, a promising idea is to construct the Internet-of-Drones, where the drones are employed to collect the information, and citizens communicate with the drones of a particular flying zone via their mobile devices to obtain the data in real-time. However, due to the high sensitivity of the information, and the openness of communication media, privacy and security issues should be addressed. Specifically, an efficient and secure authentication scheme is needed to enable users and drones to authenticate each other and share a session key. Due to the drone?s limited resources and energy, the authentication scheme should be efficient regarding the computation overhead while providing high security. In this article, we devise a secure authentication scheme based on elliptic curve for drones to secure smart city surveillance. We demonstrate that our scheme is provably secure in the random oracle model, supporting the security requirements and resisting known attacks while incurring low computation and communication costs.
引用
收藏
页数:16
相关论文
共 55 条
[1]   Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges [J].
Aggarwal, Shubhani ;
Kumar, Neeraj .
COMPUTER COMMUNICATIONS, 2020, 149 :270-299
[2]   Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks [J].
Al-Turjman, Fadi ;
Ever, Yoney Kirsal ;
Ever, Enver ;
Nguyen, Huan X. ;
David, Deebak Bakkiam .
IEEE ACCESS, 2017, 5 :24617-24631
[3]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[4]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[5]  
[Anonymous], 2004, IACR CRYPTOL EPRINT
[6]   Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J].
Bera, Basudeb ;
Chattaraj, Durbadal ;
Das, Ashok Kumar .
COMPUTER COMMUNICATIONS, 2020, 153 :229-249
[7]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[8]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[9]   Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption [J].
Cheon, Jung Hee ;
Han, Kyoohyung ;
Hong, Seong-Min ;
Kim, Hyoun Jin ;
Kim, Junsoo ;
Kim, Suseong ;
Seo, Hosung ;
Shim, Hyungbo ;
Song, Yongsoo .
IEEE ACCESS, 2018, 6 :24325-24339
[10]  
Cichella V., 2014, AIAA GUID NAV CONTR