ABSTRACT
Drones in the Internet of Drones (IoD) have been widely used in various fields, such as military reconnaissance, climate and environmental detection, logistics and transportation, and disaster relief and so on. There are many challenges related to security, privacy and energy consumption when collecting and transferring data between sensors embedded in drones. Recently, Zhang et al. developed a lightweight authentication and key agreement scheme for IoD to address these issues. Their developed scheme realized mutual authentication and key agreement of drones and users by adopting lightweight hash and bitwise XOR operations. The authors demonstrate that their proposed scheme provides better security requirements and more efficient than related schemes. However, this study shows the limitations of Zhang et al.'s scheme, which leads to their scheme may be subject to some potential attacks and cannot satisfy the session key security and untraceability properties.
- Chen Y.-J., Wang L.-C. 2019. Privacy protection for Internet of Drones: A network coding approach, IEEE Internet Things J. 6 (2) (2019) 1719–1730, http://dx. doi.org/10.1109/JIOT.2018.2875065.Google Scholar
- Aggarwal S., Kumar N. 2020. Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges, Comput. Commun. 149 (2020) 270–299, http://dx.doi.org/10.1016/j.comcom.2019.10.0143.Google ScholarDigital Library
- Valentino R., Jung W.-S., Ko Y.-B. 2018. A design and simulation of the opportunistic computation offloading with learning-based prediction for unmanned aerial vehicle (UAV) clustering networks, Sensors 18 (11) (2018) 3751.Google Scholar
- Erdelj M., Uk B., Konam D., Natalizio E 2018., From the eye of the storm: An IoT ecosystem made of sensors, smartphones and UAVs, Sensors 18 (11) (2018) 3814.Google Scholar
- Vergouw B., Nagel H., Bondt G., Custers B 2016., Drone technology: Types, payloads, applications, frequency spectrum issues and future developments, in: The Future of Drone Use, Springer, 2016, pp. 21–45, http://dx.doi.org/10.1007/978-94-6265-132-6_2.Google ScholarCross Ref
- Saharan S., Bawa S., Kumar N 2020., Dynamic pricing techniques for intelligent transportation system in smart cities: A systematic review, Comput. Commun. 150 (2020) 603–625, http://dx.doi.org/10.1016/j.comcom.2019.12.003.Google ScholarDigital Library
- Kumar N., Chilamkurti N., Rodrigues J.J.P.C 2014., Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks, 39 (3) (2014) 22–32.Google Scholar
- Bae M., Kim H 2019., Authentication and delegation for operating a multi-drone system, Sensors 19 (9) (2019) 2066.Google Scholar
- Kaur R., Kumar N., Batra S 2019., Trust management in social Internet of Things: A taxonomy, open issues, and challenges, Comput. Commun. 150 (2019), http://dx.doi.org/10.1016/j.comcom.2019.10.034.Google ScholarDigital Library
- Zhang Y., He D., Li L 2020., B. Chen, A lightweight authentication and key agreement scheme for Internet of Drones Computer Communications, 154 (15) (2020) 455-464, https://doi.org/10.1016/j.comcom.2020.02.067Google Scholar
- Li C.T., Lee C.C 2014., C.Y. Weng, A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems, J. Med. Syst. 38 (9) (2014) 77.Google Scholar
- Lee C.C., Lai Y.M., Chen C.T., Chen S.D 2016., Advanced secure anonymous authentication scheme for roaming service in global mobility networks, Wirel. Pers. Commun. 94 (3) (2016) 1–16.Google Scholar
- Vijayakumar P., Chang V., Deborah L.J.,Balusamy B., Shynuc P.G 2016., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks, Future Gener. Comput. Syst. 78 (2016) 943–955.Google ScholarDigital Library
- Amin R., Islam S.H., Vijayakumar P., Khan M.K., Chang V 2017., A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication, Multimedia Tools Appl. 77 (13) (2017) 1–26.Google Scholar
- He D., Zhang Y., Wang D., Choo K.-K.R 2018., Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography, IEEE Trans. Dependable Secure Comput. 1 (99) (2018) 1–10, http://dx.doi.org/10.1109/TDSC.2018.2857775.Google Scholar
- Feng Q., He D., Zeadally S., Kumar N., Liang K 2018., Ideal lattice-based anonymous authentication protocol for mobile devices, IEEE Syst. J. 13 (3) (2018) 2775–2785, http://dx.doi.org/10.1109/JSYST.2018.2851295.Google Scholar
- Wazid M., Das A.K. Kumar, N., Vasilakos A.V., Rodrigues J.J.P.C 2019., Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones deployment, IEEE Internet Things J. 6 (2) (2019) 3572–3584, http://dx.doi.org/10.1109/JIOT.2018.2888821.Google ScholarCross Ref
- Singh J., Gimekar A., Venkatesan S 2019., An efficient lightweight authentication scheme for human-centered industrial Internet of Things, Int. J. Commun. Syst. (2019) e4189, http://dx.doi.org/10.1002/dac.4189.Google Scholar
Index Terms
- Security Analysis of Authentication and Key Agreement for Internet of Drones
Recommendations
Efficient remote mutual authentication and key agreement
A smart card based scheme is very practical to authenticate remote users. In 2004, Juang [Juang WS. Efficient password authenticated key agreement using smart cards. Computers and Security 2004;23:167-73] proposed a mutual authentication scheme using ...
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed ...
Toward efficient security-based authentication for the internet of drones in defense wireless communication
AbstractDrones are the recent advancements in defense applications as they can perform unmanned aerial surveys. The internet of drone (IoD) is an emerging concept in drone/node communication, which has evolved with the 5G-oriented networks. Due to the ...
Comments