A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones

一种可验证的安全可靠的身份验证协议,用于协同辅助的物联网部署无人机

阅读:1

Abstract

Drones have limited computing and storage resources, which makes them unable to perform complex tactical tasks; drones working in clusters can be employed for such complex tactical task completion. But, the synergy between these drones working in clusters is mandatory. Otherwise, the adversary can easily target them, disturb their routine work, and even disturb the whole system. Only a robust and lightweight authentication protocol can handle both information fusion and collaboration and coordination of drones working in clusters efficiently and effectively and is one of the essential components of the Internet of Drones (IoD) environment as it is deployed for quick and intelligent decisions. In this regard, the already available security mechanisms for IoD deployment drones have either design flaws or failed to provide security against session key disclosure, spoofing, man in the middle (MITM), and denial of service (DoS) attacks. Therefore, this article presents a protocol based on elliptic curve cryptography (ECC), one-way hash, concatenation, and exclusive-OR (XOR) operations to establish a secure communication session among drones which makes them a powerful system to perform complex tactical tasks and information fusion intelligently. The security analysis of the proposed protocol has formally been scrutinized via BAN logic and ProVerif and informally via realistic discussion and illustrations. The results obtained from the analysis sections demonstrate that the proposed protocol is robust in security and is 63.87% more efficient in terms of communication cost compared to its competitors, and 66.46% better in terms of computational cost.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。