An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network

Yahuza, Muktar and Idris, Mohd Yamani Idna and Wahab, Ainuddin Wahid Abdul and Nandy, Tarak and Ahmedy, Ismail and Ramli, Roziana (2021) An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network. IEEE Access, 9. pp. 31420-31440. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2021.3060420.

Full text not available from this repository.

Abstract

Security and privacy are among the most critical challenges on the internet of drones (IoD) network. The communication entities of the IoD network can communicate securely with the use of authenticated key agreement (AKA) based techniques. However, the design of such techniques must balance the tradeoff between security and lightweight features. Recently, Chen et al. proposed an authentication and key sharing scheme for IoD deployment. It is, however, realized after scrutiny that the proposed technique is vulnerable to security attacks under the well-accepted Canetti-Krawczyk (CK) adversary model. Moreover, the scheme applies to the IoD network with only one drones' flying zone. To solve these challenges, this paper proposed a secure lightweight proven authenticated key agreement (SLPAKA) technique for IoD deployment. The technique is free from all the problems identified in the scheme of Chen et al. To ensure the reliability of the SLPAKA, the security of the technique has been assessed from a theoretical method and formal way using the ProVerif cryptographic protocol verification tool. Apart from comparing the performance of SLPAKA with the benchmarking schemes in terms of security, computational cost, and communication cost, the SLPAKA and the technique proposed by Chen et al. are implemented using a python programming language to evaluate and compare their performance in terms of energy consumption and computational time metrics. The results show that the SLPAKA outperforms the technique of Chen et al. and all the other benchmarking techniques in terms of security and lightweight features.

Item Type: Article
Funders: University of Malaya Impact Oriented Interdisciplinary Research Grant (IIRG003A) (IIRG003B) (C-19IISS), Ministry of Higher Education Malaysia Fundamental Research Grant Scheme (FRGS) (FP055-2019A)
Uncontrolled Keywords: Drones; Authentication; Elliptic curve cryptography; Internet of Things; Public key; Hash functions; Smart grids; Authenticated key agreement; CK adversarial model; certificateless AKA; elliptic curve cryptography; Internet of Drones; mobile edge computing; ProVerif; UAS; UAV
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > TA Engineering (General). Civil engineering (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms Zaharah Ramly
Date Deposited: 31 Mar 2022 04:35
Last Modified: 31 Mar 2022 04:35
URI: http://eprints.um.edu.my/id/eprint/28260

Actions (login required)

View Item View Item