skip to main content
10.1145/3545729.3545784acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmhiConference Proceedingsconference-collections
research-article

Security Analysis of Authentication and Key Agreement for Internet of Drones

Authors Info & Claims
Published:13 October 2022Publication History

ABSTRACT

Drones in the Internet of Drones (IoD) have been widely used in various fields, such as military reconnaissance, climate and environmental detection, logistics and transportation, and disaster relief and so on. There are many challenges related to security, privacy and energy consumption when collecting and transferring data between sensors embedded in drones. Recently, Zhang et al. developed a lightweight authentication and key agreement scheme for IoD to address these issues. Their developed scheme realized mutual authentication and key agreement of drones and users by adopting lightweight hash and bitwise XOR operations. The authors demonstrate that their proposed scheme provides better security requirements and more efficient than related schemes. However, this study shows the limitations of Zhang et al.'s scheme, which leads to their scheme may be subject to some potential attacks and cannot satisfy the session key security and untraceability properties.

References

  1. Chen Y.-J., Wang L.-C. 2019. Privacy protection for Internet of Drones: A network coding approach, IEEE Internet Things J. 6 (2) (2019) 1719–1730, http://dx. doi.org/10.1109/JIOT.2018.2875065.Google ScholarGoogle Scholar
  2. Aggarwal S., Kumar N. 2020. Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges, Comput. Commun. 149 (2020) 270–299, http://dx.doi.org/10.1016/j.comcom.2019.10.0143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Valentino R., Jung W.-S., Ko Y.-B. 2018. A design and simulation of the opportunistic computation offloading with learning-based prediction for unmanned aerial vehicle (UAV) clustering networks, Sensors 18 (11) (2018) 3751.Google ScholarGoogle Scholar
  4. Erdelj M., Uk B., Konam D., Natalizio E 2018., From the eye of the storm: An IoT ecosystem made of sensors, smartphones and UAVs, Sensors 18 (11) (2018) 3814.Google ScholarGoogle Scholar
  5. Vergouw B., Nagel H., Bondt G., Custers B 2016., Drone technology: Types, payloads, applications, frequency spectrum issues and future developments, in: The Future of Drone Use, Springer, 2016, pp. 21–45, http://dx.doi.org/10.1007/978-94-6265-132-6_2.Google ScholarGoogle ScholarCross RefCross Ref
  6. Saharan S., Bawa S., Kumar N 2020., Dynamic pricing techniques for intelligent transportation system in smart cities: A systematic review, Comput. Commun. 150 (2020) 603–625, http://dx.doi.org/10.1016/j.comcom.2019.12.003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kumar N., Chilamkurti N., Rodrigues J.J.P.C 2014., Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks, 39 (3) (2014) 22–32.Google ScholarGoogle Scholar
  8. Bae M., Kim H 2019., Authentication and delegation for operating a multi-drone system, Sensors 19 (9) (2019) 2066.Google ScholarGoogle Scholar
  9. Kaur R., Kumar N., Batra S 2019., Trust management in social Internet of Things: A taxonomy, open issues, and challenges, Comput. Commun. 150 (2019), http://dx.doi.org/10.1016/j.comcom.2019.10.034.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Zhang Y., He D., Li L 2020., B. Chen, A lightweight authentication and key agreement scheme for Internet of Drones Computer Communications, 154 (15) (2020) 455-464, https://doi.org/10.1016/j.comcom.2020.02.067Google ScholarGoogle Scholar
  11. Li C.T., Lee C.C 2014., C.Y. Weng, A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems, J. Med. Syst. 38 (9) (2014) 77.Google ScholarGoogle Scholar
  12. Lee C.C., Lai Y.M., Chen C.T., Chen S.D 2016., Advanced secure anonymous authentication scheme for roaming service in global mobility networks, Wirel. Pers. Commun. 94 (3) (2016) 1–16.Google ScholarGoogle Scholar
  13. Vijayakumar P., Chang V., Deborah L.J.,Balusamy B., Shynuc P.G 2016., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks, Future Gener. Comput. Syst. 78 (2016) 943–955.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Amin R., Islam S.H., Vijayakumar P., Khan M.K., Chang V 2017., A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication, Multimedia Tools Appl. 77 (13) (2017) 1–26.Google ScholarGoogle Scholar
  15. He D., Zhang Y., Wang D., Choo K.-K.R 2018., Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography, IEEE Trans. Dependable Secure Comput. 1 (99) (2018) 1–10, http://dx.doi.org/10.1109/TDSC.2018.2857775.Google ScholarGoogle Scholar
  16. Feng Q., He D., Zeadally S., Kumar N., Liang K 2018., Ideal lattice-based anonymous authentication protocol for mobile devices, IEEE Syst. J. 13 (3) (2018) 2775–2785, http://dx.doi.org/10.1109/JSYST.2018.2851295.Google ScholarGoogle Scholar
  17. Wazid M., Das A.K. Kumar, N., Vasilakos A.V., Rodrigues J.J.P.C 2019., Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones deployment, IEEE Internet Things J. 6 (2) (2019) 3572–3584, http://dx.doi.org/10.1109/JIOT.2018.2888821.Google ScholarGoogle ScholarCross RefCross Ref
  18. Singh J., Gimekar A., Venkatesan S 2019., An efficient lightweight authentication scheme for human-centered industrial Internet of Things, Int. J. Commun. Syst. (2019) e4189, http://dx.doi.org/10.1002/dac.4189.Google ScholarGoogle Scholar

Index Terms

  1. Security Analysis of Authentication and Key Agreement for Internet of Drones

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMHI '22: Proceedings of the 6th International Conference on Medical and Health Informatics
      May 2022
      329 pages
      ISBN:9781450396301
      DOI:10.1145/3545729

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format