• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Badshah, Akhtar (Badshah, Akhtar.) | Abbas, Ghulam (Abbas, Ghulam.) | Waqas, Muhammad (Waqas, Muhammad.) | Tu, Shanshan (Tu, Shanshan.) | Abbas, Ziaul Haq (Abbas, Ziaul Haq.) | Muhammad, Fazal (Muhammad, Fazal.) | Chen, Sheng (Chen, Sheng.)

Indexed by:

EI Scopus SCIE

Abstract:

The use of Internet of Drones (IoD) technology has surged across various domains such as logistics, surveying, industrial inspections, emergency response, security, infrastructure monitoring, crop management, and more. However, real-time communication with drones or Unmanned Aerial Vehicles (UAVs) in the IoD environment occurs over an insecure open channel, making it susceptible to various security and privacy vulnerabilities, including unauthorized access, data interception, denial of service attacks, and privacy concerns. Due to their unique characteristics, including long transmission distances, unstable communication environments, resource limitations, and the highly dynamic nature of UAVs, ensuring the security and privacy of IoD systems is of paramount importance for the success of IoD-based applications. Furthermore, drones are resource-constrained devices, and employing expensive security solutions is impractical, as it would significantly reduce the operational capacity of drones. In this paper, we present the design of an ultralightweight, secure, and robust user-authenticated key agreement framework for the IoD environment, named USAF-IoD. The proposed USAF-IoD is developed by incorporating authenticated encryption (ASCON), cryptographic hashing, XOR operations, and the use of physical unclonable functions (PUFs). PUFs are employed to enhance resistance against physical tampering attacks. The security analysis reveals that the proposed USAF-IoD meets the essential security requirements of the IoD environment. The comparative analysis further highlights the effectiveness of the proposed USAF-IoD, notably excelling in terms of security and functionality characteristics when compared to existing benchmark schemes, and showcasing competitive performance in computation, communication, and energy overheads.

Keyword:

Elliptic curve cryptography physical unclonable functions key agreement security Feature extraction Servers user authentication Security Authentication Hash functions Internet of Drones (IoD) Drones

Author Community:

  • [ 1 ] [Badshah, Akhtar]Univ Malakand, Dept Software Engn, Lower Dir 18800, Pakistan
  • [ 2 ] [Abbas, Ghulam]GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Telecommun & Networking TeleCoN Res Ctr, Swabi 23640, Pakistan
  • [ 3 ] [Waqas, Muhammad]Univ Greenwich, Fac Engn & Sci, Sch Comp & Math Sci, London SE109LS, England
  • [ 4 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 5 ] [Abbas, Ziaul Haq]GIK Inst Engn Sci & Technol, Fac Elect Engn, Swabi 23640, Pakistan
  • [ 6 ] [Muhammad, Fazal]Univ Engn & Technol, Dept Elect Engn, Mardan 23200, Pakistan
  • [ 7 ] [Chen, Sheng]Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, England

Reprint Author's Address:

  • [Waqas, Muhammad]Univ Greenwich, Fac Engn & Sci, Sch Comp & Math Sci, London SE109LS, England;;

Show more details

Related Keywords:

Related Article:

Source :

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY

ISSN: 0018-9545

Year: 2024

Issue: 8

Volume: 73

Page: 10963-10977

6 . 8 0 0

JCR@2022

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 13

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:654/5300278
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.