Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

被引:34
|
作者
Wu, Tsuyang [1 ]
Guo, Xinglan [1 ]
Chen, Yehcheng [2 ]
Kumari, Saru [3 ]
Chen, Chienming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
authentication; Internet of Drones; 5G networks; cryptanalysis; lightweight; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; INTERNET; PRIVACY; ALGORITHM;
D O I
10.3390/drones6010010
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):
  • [2] Security Authentication Protocol for Massive Machine Type Communication in 5G Networks
    Miao J.
    Wang Z.
    Wang M.
    Feng X.
    Xiao N.
    Sun X.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [3] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [4] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [5] Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks
    Alladi, Tejasvi
    Venkatesh, Vishnu
    Chamola, Vinay
    Chaturvedi, Nitin
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [6] A Security Enhanced 5G Authentication Scheme for Insecure Channel
    Hu, Xinxin
    Liu, Caixia
    Liu, Shuxin
    Cheng, Xiaotao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (03): : 711 - 713
  • [7] A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks
    Shang, Zhengyi
    Ma, Maode
    Li, Xiaohong
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [8] Round-Efficient Security Authentication Protocol for 5G Network
    Geng, Guining
    Miao, Junfeng
    Xiao, Nan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 269 - 283
  • [9] An Enhanced Cross-Network-Slice Authentication Protocol for 5G
    Yadav, Awaneesh Kumar
    Wijethilaka, Shalitha
    Braeken, An
    Misra, Manoj
    Liyanage, Madhusanka
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2023, 8 (04): : 555 - 573
  • [10] A new authentication and key agreement protocol for 5G wireless networks
    Tian Liu
    Fan Wu
    Xiong Li
    Chaoyang Chen
    Telecommunication Systems, 2021, 78 : 317 - 329