Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

被引:71
|
作者
Hussain, Sajid [1 ]
Chaudhry, Shehzad Ashraf [2 ]
Alomari, Osama Ahmad [2 ]
Alsharif, Mohammed H. [3 ]
Khan, Muhammad Khurram [4 ]
Kumar, Neeraj [5 ,6 ,7 ,8 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci & Software Engn, Islamabad 44000, Pakistan
[2] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, TR-34310 Istanbul, Turkey
[3] Sejong Univ, Coll Elect & Informat Engn, Dept Elect Engn, Seoul, South Korea
[4] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[5] Thapar Inst Engn & Technol, Dept CSED, Patiala 147004, Punjab, India
[6] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[8] King Abdulaziz Univ, Jeddah 21589, Saudi Arabia
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Drones; Security; Authentication; Internet of Things; Biometrics (access control); Surveillance; Elliptic curve cryptography; drone capture attack; Internet of Drones (IoD); Internet of Things (IoT) security; key-agreement; provable security; smart city security; three-factor authentication; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; THINGS; PRIVACY; EFFICIENT; DESIGN;
D O I
10.1109/JSYST.2021.3057047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and military/rescue operations in smart cities. However, this growth in infrastructure smartness is also subject to new security threats and the countermeasures require new customized solutions for IoD. Many schemes to secure IoD environments are proposed recently; however, some of those were proved as insecure and some degrades the efficiency. In this article, using elliptic curve cryptography, we proposed a new authentication scheme to secure the communication between a user and a drone flying in some specific flying zone. The security of the proposed scheme is solicited using formal Random oracle method along with a brief discussion on security aspects provided by proposed scheme. Finally, the comparisons with some related and latest schemes is illustrated.
引用
收藏
页码:4431 / 4438
页数:8
相关论文
共 50 条
  • [1] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428
  • [2] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [3] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [4] An Anonymous and Efficient ECC-Based Authentication Scheme for SIP
    Zhou, Yousheng
    Chen, Xinyun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [5] An Untraceable ECC-Based Remote User Authentication Scheme
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Albeshri, Aiiad
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1742 - 1760
  • [6] ECC-Based Authentication Scheme for Cloud-Based Robots
    Saurabh Jain
    C. Nandhini
    Rajesh Doriya
    [J]. Wireless Personal Communications, 2021, 117 : 1557 - 1576
  • [7] ECC-Based Authentication Scheme for Cloud-Based Robots
    Jain, Saurabh
    Nandhini, C.
    Doriya, Rajesh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1557 - 1576
  • [8] Security flaw of an ECC-based signcryption scheme with anonymity
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, No. 4, North Jianshe Road, Chenghua District, Chengdu, Sichuan, 610054, China
    不详
    不详
    [J]. Int. J. Netw. Secur., 2013, 4 (317-320):
  • [9] Security analysis and design of an efficient ECC-based two-factor password authentication scheme
    Maitra, Tanmoy
    Obaidat, Mohammad S.
    Islam, Sk Hafizul
    Giri, Debasis
    Amin, Ruhul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4166 - 4181
  • [10] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294