Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

被引:34
|
作者
Wu, Tsuyang [1 ]
Guo, Xinglan [1 ]
Chen, Yehcheng [2 ]
Kumari, Saru [3 ]
Chen, Chienming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
authentication; Internet of Drones; 5G networks; cryptanalysis; lightweight; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; INTERNET; PRIVACY; ALGORITHM;
D O I
10.3390/drones6010010
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [32] A Security Enhanced Authentication and Key Distribution Protocol for Wireless Networks
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1571 - 1575
  • [33] A security enhanced authentication and key distribution protocol for wireless networks
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Niu, Ben
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 343 - 352
  • [34] An Optimal Scheduling Technique for Smart Grid Communications over 5G Networks
    Orumwense, Efe F.
    Abo-Al-Ez, Khaled
    APPLIED SCIENCES-BASEL, 2023, 13 (20):
  • [35] Maritime Communications in 5G and Beyond Networks
    Wei Feng
    Yunfei Chen
    Jing Li
    Yanmin Wang
    Tony Q.S.Quek
    China Communications, 2022, 19 (09) : 4 - 6
  • [36] Exploiting Multipath Terahertz Communications for Physical Layer Security in Beyond 5G Networks
    Petrov, Vitaly
    Moltchanov, Dmitri
    Jornet, Josep Miquel
    Koucheryavy, Yevgeni
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 865 - 872
  • [37] Amassing the Security: An Enhanced Authentication and Key AgreementProtocol for Remote Surgery in Healthcare Environment
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Kumari, Saru
    Pirouz, Matin
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 134 (01): : 317 - 341
  • [38] Enhanced Paging Monitoring for 5G and Beyond 5G Networks
    Agiwal, Anil
    Agiwal, Mamta
    IEEE ACCESS, 2022, 10 : 27197 - 27210
  • [39] Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks
    Khan, Shah Khalid
    Shiwakoti, Nirajan
    Stasinopoulos, Peter
    Warren, Matthew
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 154 - 158
  • [40] A Systematic Analysis of 5G Networks With a Focus on 5G Core Security
    Tang, Qiang
    Ermis, Orhan
    Nguyen, Cu D.
    De Oliveira, Alexandre
    Hirtzig, Alain
    IEEE ACCESS, 2022, 10 : 18298 - 18319