2021
DOI: 10.1109/access.2021.3076692
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Lightweight Authentication Protocol for Securing IoD

Abstract: The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. The main entities in IoD are drones, ground station, and external user. Before operationalizing a drone in IoD, a control infrastructure is mandatory for securing its open network channel (Flying Ad Hoc Networks FANETs). An attacker can easily capture data from the available network channel … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(31 citation statements)
references
References 47 publications
(87 reference statements)
0
28
0
Order By: Relevance
“…Simple hash cryptographic functions were used in [30] to minimize the computation cost, and a resilient authentication protocol for IoD was proposed based on the Hash-based Message Authentication code Secure Hash Algorithmic (HMASHA1) function and randomized keys. To significantly reduce the computation effort and energy consumption during encryption and decryption operations, while retaining robustness against possible attacks, an efficient Lightweight Privacy-Preserving Scheme (L-PPS) for a smart IoD environment was proposed in [35].…”
Section: Hash-based Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Simple hash cryptographic functions were used in [30] to minimize the computation cost, and a resilient authentication protocol for IoD was proposed based on the Hash-based Message Authentication code Secure Hash Algorithmic (HMASHA1) function and randomized keys. To significantly reduce the computation effort and energy consumption during encryption and decryption operations, while retaining robustness against possible attacks, an efficient Lightweight Privacy-Preserving Scheme (L-PPS) for a smart IoD environment was proposed in [35].…”
Section: Hash-based Authenticationmentioning
confidence: 99%
“…Software-based authentication schemes solely rely on software, mathematical algorithmic approaches, secret keys to authorize the nodes, and encryption methods (e.g., RSA and Advanced Encryption Standard (AES)). Additionally, the one-way hash functions have been traditionally used in modern cryptography and information-security applications, such as Message Authentication Codes (MACs) and digital signatures, in order to quickly map message data of arbitrary sizes to bit arrays of fixed, compressed sizes [30]. Several cryptographic hash algorithms have been proposed over the last 30 years.…”
mentioning
confidence: 99%
“…Their protocol is unsafe, and confidentiality, privacy, and reliability are not guaranteed [38]. Jan et al [37] proposed an HMACSHA1-based authentication protocol for securing IoD and have combined hash message authentication code with a secure hash algorithm (HMACSHA1) to offer a much more secure IoD environment for drone technology. Their scheme securely communicated between a drone to GCS, GCS to drone, drone to drone, and GCS.…”
Section: Related Workmentioning
confidence: 99%
“…Let U k represent the x th instance of U, V k is the y th instance of V, and G k is the z th instance of G. However, I k is known to be the instance of all three members, namely, U, V, and G; likely, an oracle has three outcomes, namely, accept, reject, ⊥ and do nothing/no result; accept means receiving a message authentically, rejection means getting a wrong message, and do nothing/no result. Before execution, Ʋ has ((RM, SM, PKM, SKM)) parameters, Ɣ has ((RD, SD, PKD, SKD)) parameters and Ǥ has ((RG, SG, PKG, SKG)) parameters and supposes these are in the memory of each participant stored securely [37].…”
Section: ) Semantic Securitymentioning
confidence: 99%
“…In recent years, it has started to take a place in daily life thanks to the increasingly developing microcontroller elements and batteries with increasing energy density. Thus, it is becoming more and more important with new emerging areas of use such as rapid seeding and control of large planting areas in agricultural areas, interfering with fires in the upper floors of skyscrapers in daily life, and distribution of food and cargo [2,3].…”
Section: Introductionmentioning
confidence: 99%