• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Badshah, A. (Badshah, A..) | Abbas, G. (Abbas, G..) | Waqas, M. (Waqas, M..) | Tu, S. (Tu, S..) | Abbas, Z.H. (Abbas, Z.H..) | Muhammad, F. (Muhammad, F..) | Chen, S. (Chen, S..)

Indexed by:

EI Scopus SCIE

Abstract:

The use of Internet of Drones (IoD) technology has surged across various domains such as logistics, surveying, industrial inspections, emergency response, security, infrastructure monitoring, crop management, and more. However, real-time communication with drones or Unmanned Aerial Vehicles (UAVs) in the IoD environment occurs over an insecure open channel, making it susceptible to various security and privacy vulnerabilities, including unauthorized access, data interception, denial of service attacks, and privacy concerns. Due to their unique characteristics, including long transmission distances, unstable communication environments, resource limitations, and the highly dynamic nature of UAVs, ensuring the security and privacy of IoD systems is of paramount importance for the success of IoD-based applications. Furthermore, drones are resource-constrained devices, and employing expensive security solutions is impractical, as it would significantly reduce the operational capacity of drones. In this paper, we present the design of an ultralightweight, secure, and robust user-authenticated key agreement framework for the IoD environment, named USAF-IoD. The proposed USAF-IoD is developed by incorporating authenticated encryption (ASCON), cryptographic hashing, XOR operations, and the use of physical unclonable functions (PUFs). PUFs are employed to enhance resistance against physical tampering attacks. The security analysis reveals that the proposed USAF-IoD meets the essential security requirements of the IoD environment. The comparative analysis further highlights the effectiveness of the proposed USAF-IoD, notably excelling in terms of security and functionality characteristics when compared to existing benchmark schemes, and showcasing competitive performance in computation, communication, and energy overheads. IEEE

Keyword:

key agreement Elliptic curve cryptography user authentication Authentication security Feature extraction Hash functions Servers Security Internet of Drones Drones physical unclonable functions

Author Community:

  • [ 1 ] [Badshah A.]Department of Software Engineering, University of Malakand, Dir Lower, Pakistan
  • [ 2 ] [Abbas G.]Telecommunication and Networking (TeleCoN) Research Center, Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi, Pakistan
  • [ 3 ] [Waqas M.]School of Computing and Mathematical Sciences, Faculty of Engineering and Science, University of Greenwich, U.K
  • [ 4 ] [Tu S.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 5 ] [Abbas Z.H.]Faculty of Electrical Engineering, GIK Institute of Engineering Sciences and Technology, Topi, Pakistan
  • [ 6 ] [Muhammad F.]Department of Electrical Engineering, University of Engineering and Technology, Mardan, Pakistan
  • [ 7 ] [Chen S.]School of Electronics and Computer Science, University of Southampton, Southampton, U.K

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Vehicular Technology

ISSN: 0018-9545

Year: 2024

Issue: 8

Volume: 73

Page: 1-15

6 . 8 0 0

JCR@2022

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 12

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 5

Affiliated Colleges:

Online/Total:428/10797031
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.