2022
DOI: 10.1109/jiot.2022.3163367
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(21 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…Pu et al 17 discussed a protocol using a duffing map chaotic system, without addressing inter‐drone communication and location validation. Pu et al 34 discussed a PUF and Henon map based mutual authentication mechanism for IoD. However, the mutual authentication between drones is server‐based and location validation of the drone is not performed.…”
Section: Related Workmentioning
confidence: 99%
“…Pu et al 17 discussed a protocol using a duffing map chaotic system, without addressing inter‐drone communication and location validation. Pu et al 34 discussed a PUF and Henon map based mutual authentication mechanism for IoD. However, the mutual authentication between drones is server‐based and location validation of the drone is not performed.…”
Section: Related Workmentioning
confidence: 99%
“…the importance of authentication and such incidents motivate the need to propose and design secure authentication schemes for drones. As a result, several schemes employed classical cryptosystems to ensure the security and privacy of communications in the IoD environment [24]- [38]. However, Quantum computing can efficiently break those classical cryptosystems that rely on the complexity of these problems [39].…”
Section: A Motivationmentioning
confidence: 99%
“…The basic idea behind their scheme is that the ground station and drone employ the chaotic maps' seed value to randomly rearrange genuine messages according to the created chaotic sequence. Also, Pu et al [22] proposed a lightweight mutual authentication and key agreement scheme with protecting privacy for the IoD. Chaotic system and physical unclonable function are used to provide mutual authentication and create a session key between between IoD system communication parties.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We analyzed the validation of security protocols against manin-the-middle and replay attacks by utilizing AVISPA simulation tools which is widely employed in designing secure protocols [48], [49], [50]. There are 4 backends are utilized in AVIPA simulations: the Tree Automata based on Automatic Approximations for the Analysis of Security Protocols (TA4SP), the On-the-fly mode-checker (OFMC), the Constraint-logic-based Attack Searcher (CL-AtSe), and the SAT-based Model Checker (SATMC).…”
Section: T) (6)mentioning
confidence: 99%