IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2021
DOI: 10.1109/infocomwkshps51825.2021.9484594
|View full text |Cite
|
Sign up to set email alerts
|

Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…In the proposed director drone ‐ associate drone mutual authentication protocol, the director drone stores Chj$$ C{h}_j $$, HPj$$ H{P}_j $$, IDMj$$ ID{M}_j $$, IDPi$$ ID{P}_i $$, and a Chebyshev polynomial and the storage cost is 768 bits; whereas the associate drone stores only IDMj$$ ID{M}_j $$, IDPi$$ ID{P}_i $$, initial challenge, and helper data making the storage cost of 608 bits. The storage cost of proposed protocol 1 is 640 bits, which is lower than the works of Jan et al, 32 Li et al, 64 and Nyangaresi et al, 39 and only slightly higher than Alladi et al, 41 Ko et al, 43 Pu et al, 17 and Alladi et al 16 The main advantage of the proposed protocol is that no secret keys are stored in drone memory and only variables and nonsensitive data need to be stored in drone memory that are refreshed after each session. This makes the system fail‐safe and secure even if the drone is captured.…”
Section: Performance Analysis and Comparisonmentioning
confidence: 67%
See 1 more Smart Citation
“…In the proposed director drone ‐ associate drone mutual authentication protocol, the director drone stores Chj$$ C{h}_j $$, HPj$$ H{P}_j $$, IDMj$$ ID{M}_j $$, IDPi$$ ID{P}_i $$, and a Chebyshev polynomial and the storage cost is 768 bits; whereas the associate drone stores only IDMj$$ ID{M}_j $$, IDPi$$ ID{P}_i $$, initial challenge, and helper data making the storage cost of 608 bits. The storage cost of proposed protocol 1 is 640 bits, which is lower than the works of Jan et al, 32 Li et al, 64 and Nyangaresi et al, 39 and only slightly higher than Alladi et al, 41 Ko et al, 43 Pu et al, 17 and Alladi et al 16 The main advantage of the proposed protocol is that no secret keys are stored in drone memory and only variables and nonsensitive data need to be stored in drone memory that are refreshed after each session. This makes the system fail‐safe and secure even if the drone is captured.…”
Section: Performance Analysis and Comparisonmentioning
confidence: 67%
“…However, they have not addressed clonability of drones and the mutual authentication between the entities. Alladi et al 41 introduced a PUF‐based mutual authentication mechanism between drone and the 5G base station without confirming the drone location and not considering the insider attacks and drone‐to‐drone communication. Cabuk et al 42 discussed the authentication for a group of drones using context information without a ground station.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, simulation results were provided to ascertain the performance of this authentication protocol in NodeMCUv3.0 and Raspberry Pi 3B simulation environments, when several mathematical and cryptographic operations (e.g., XOR, pseudo-random number generation (PRNG), and hash functions) were carried out. In [71], Drone-MAP, a mutual authentication protocol for 5G UAV-aided backhaul networks, was proposed to avoid common security attacks (e.g., eavesdropping, impersonation, and replay attacks). The goal of this protocol was to establish secure sessions and meet the confidentiality and untraceability requirements in communication scenarios with a single BS and multiple UAVs.…”
Section: Puf-based Authenticationmentioning
confidence: 99%
“…Therefore, recent UAV security research works are targeting designing lightweight authentication protocols that will not burden the UAVs. For instance, the authors in [ 21 ] proposed a two-stage mutual authentication protocol for Software-Defined Network (SDN)-based multi UAV networks operating in surveillance areas.One of the most recent works is [ 22 ], the authors proposed a lightweight Physical Unclonable Function (PUF)-based mutual authentication scheme for UAV flying base station in a 5G network. The authentication in [ 22 ] achieves secure authentication without the use of a Public Key Infrastructure (PKI) or any time-consuming encryption.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, the authors in [ 21 ] proposed a two-stage mutual authentication protocol for Software-Defined Network (SDN)-based multi UAV networks operating in surveillance areas.One of the most recent works is [ 22 ], the authors proposed a lightweight Physical Unclonable Function (PUF)-based mutual authentication scheme for UAV flying base station in a 5G network. The authentication in [ 22 ] achieves secure authentication without the use of a Public Key Infrastructure (PKI) or any time-consuming encryption. However, the scheme assumes a trusted 5G infrastructure and does not take into consideration mutual authentication.…”
Section: Related Workmentioning
confidence: 99%