Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment

被引:0
|
作者
Abulkasim, Hussein [1 ,2 ]
Goncalves, Brian [1 ]
Mashatan, Atefeh [1 ]
Ghose, Shohini [3 ,4 ]
机构
[1] Toronto Metropolitan Univ, Ted Rogers Sch Informat Technol Management, Cybersecur Res Lab, Toronto, ON M5B 2K3, Canada
[2] New Valley Univ, Fac Sci, El Kharga 71511, Egypt
[3] Wilfrid Laurier Univ, Dept Phys & Comp Sci, Waterloo, ON N2L 3C5, Canada
[4] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
来源
IEEE ACCESS | 2022年 / 10卷
基金
加拿大自然科学与工程研究理事会;
关键词
Drones; Security; Quantum computing; Authentication; Computer security; Protocols; Servers; Internet of Things; Cryptography; internet-of-drones; quantum-based communication; quantum cryptography; KEY DISTRIBUTION; LIGHTWEIGHT AUTHENTICATION; PROTOCOL; SURVEILLANCE;
D O I
10.1109/ACCESS.2022.3204793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led to a rise in the use of their civilian and commercial applications. The access of these drones to controlled airspace can be efficiently coordinated through particular layered network architecture, often referred to as the Internet-of-Drones (IoD). The nature of IoD, which is deployed in an open-access environment, brings significant safety and security concerns. Classical cryptosystems such as elliptic curve cryptography, Rivest-Shamir-Adleman, and Diffie-Hellman are essential building blocks to secure communication in the IoD. However, with the rapid development of quantum computing, it will be easy to break public-key cryptosystems using efficient quantum algorithms like Shor's algorithm. Thus, building quantum-safe solutions to enhance IoD security has become imperative. Fortunately, quantum technologies can provide unconditional security solutions to protect data and communications in the IoD environment. This paper proposes a quantum-based scheme to prevent unauthorized drones from accessing a specific flight zone and authenticates the identities and shared secret messages of involved entities. To do so, we used a quantum channel to encode the private information based on a pre-shared key and a random key generated in a session. The involved entities also perform mutual authentication and share a secret key. We also provide the security proofs and analysis of the proposed scheme that indicates its resistance to well-known attacks.
引用
收藏
页码:94963 / 94972
页数:10
相关论文
共 50 条
  • [1] Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment
    Abulkasim, Hussein
    Goncalves, Brian
    Mashatan, Atefeh
    Ghose, Shohini
    [J]. IEEE Access, 2022, 10 : 94963 - 94972
  • [2] Designing Secure Data Storage and Retrieval Scheme in Cloud-Assisted Internet-of-Drones Environment
    Prasad, Suryakant
    Rao, Y. Sreenivasa
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13734 - 13751
  • [3] Secure communication framework for blockchain-based internet of drones-enabled aerial computing deployment
    Wazid, Mohammad
    Bera, Basudeb
    Das, Ashok Kumar
    Garg, Sahil
    Niyato, Dusit
    Hossain, M. Shamim
    [J]. IEEE Internet of Things Magazine, 2021, 4 (03): : 120 - 126
  • [4] Quantum-Safe Secure and Authorized Communication Protocol for Internet of Drones
    Mishra, Dheerendra
    Singh, Mrityunjay
    Rewal, Purva
    Pursharthi, Komal
    Kumar, Neeraj
    Barnawi, Ahmed
    Rathore, Rajkumar Singh
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16499 - 16507
  • [5] QSKCG: Quantum-based secure key communication and key generation scheme for outsourced data in cloud
    Adouth, Vamshi
    Rajagopal, Eswari
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (20):
  • [6] Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
    Bera, Basudeb
    Chattaraj, Durbadal
    Das, Ashok Kumar
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 229 - 249
  • [7] Authenticated Deterministic Secure Quantum Communication Based on Entanglement Swapping
    Liu, Wenjie
    Chen, Hanwu
    Liu, Zhihao
    Hu, Wenbo
    [J]. SECOND INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING: WGEC 2008, PROCEEDINGS, 2008, : 471 - 475
  • [8] A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography
    Houssem Eddine Mohamadi
    Laaziz Lahlou
    Nadjia Kara
    Aris Leivadeas
    [J]. Nonlinear Dynamics, 2024, 112 : 4977 - 5012
  • [9] A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Srinivas, Jangirala
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8739 - 8752
  • [10] A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography
    Mohamadi, Houssem Eddine
    Lahlou, Laaziz
    Kara, Nadjia
    Leivadeas, Aris
    [J]. NONLINEAR DYNAMICS, 2024, 112 (06) : 4977 - 5012