Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

被引:34
|
作者
Wu, Tsuyang [1 ]
Guo, Xinglan [1 ]
Chen, Yehcheng [2 ]
Kumari, Saru [3 ]
Chen, Chienming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
authentication; Internet of Drones; 5G networks; cryptanalysis; lightweight; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; INTERNET; PRIVACY; ALGORITHM;
D O I
10.3390/drones6010010
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Blockchain-based Authentication for 5G Networks
    Haddad, Zaher
    Fouda, Mostafa M.
    Mahmoud, Mohamed
    Abdallah, Mohamed
    2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, 2020, : 189 - 194
  • [42] Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
    Gupta, Shubham
    Parne, Balu L.
    Chaudhari, Narendra S.
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 369 - 374
  • [43] Multilayer Distributed Control over 5G Networks: Challenges and Security Threats
    Vreman, Nils
    Maggio, Martina
    PROCEEDINGS OF THE 2019 WORKSHOP ON FOG COMPUTING AND THE IOT (IOT-FOG '19), 2019, : 31 - 35
  • [44] Congestion Mitigation in 5G Networks using Drone relays
    Jaziri, Aymen
    Nasri, Ridha
    Chahed, Tijani
    2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 233 - 238
  • [45] A Construction of Security Enhanced and Efficient Handover AKA Protocol in 5G Communication Network
    Sharma, Aditya
    Sharma, Ila
    Jain, Aaditya
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [46] Neuro-Fuzzy Based Handover Authentication Protocol for Ultra Dense 5G Networks
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Abeka, Silvance Onyango
    2020 IEEE 2ND GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (IEEE GPECOM2020), 2020, : 339 - 344
  • [47] 5G for drone networking
    Xu, Changqiao
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)
  • [48] A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
    Yan, Xiaobei
    Ma, Maode
    COMPUTERS & SECURITY, 2022, 116
  • [49] A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1311 - 1316
  • [50] A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks
    Yan, Xiaobei
    Ma, Maude
    Su, Rong
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1678 - 1684