2020
DOI: 10.1109/access.2020.3019367
|View full text |Cite
|
Sign up to set email alerts
|

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment

Abstract: A drone is an unmanned aerial vehicle, which is deployed in a particular Fly Zone (FZ), and used to collect crucial information from its surrounding environment to be transmitted to the server for further processing. Generally, a Mobile User (MU) is required to access the real-time information collected by the drone stationed in a specific FZ securely. Therefore, to ensure secure and reliable communications an Authenticated Key Exchange (AKE) protocol is imperative to the Internet of Drone (IoD) environment. A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 72 publications
(45 citation statements)
references
References 35 publications
0
37
0
Order By: Relevance
“…Recently, Tanveer et al [29] proposed a lightweight protocol for IoD which utilize AE-algorithm, SHA256, and bit-wise XOR operation. Their protocol consists of revocation, drone-deployment phases in addition with password updating phase.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Tanveer et al [29] proposed a lightweight protocol for IoD which utilize AE-algorithm, SHA256, and bit-wise XOR operation. Their protocol consists of revocation, drone-deployment phases in addition with password updating phase.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this connection, Cho et al [46] protocol, when a drone (d), initiate flight, it extracts a random number n d , and identity id d , sends it towards ground station gs on open channel which is a soft target for an operator to use it for launching some other attack on accessing other application. Nonetheless, it might not use the same identity everywhere, but according to [29], thousands of users have the habit of reusing the same identity and password. As per statistics received from Microsoft, in just three months, out of 1.5 million users used 6.5 identities and passwords for only 25 websites, means a single password is shared in 3.9 online accounts/applications.…”
Section: ) Privileged Insider Attackmentioning
confidence: 99%
“…This section uses the Scyther tool [29], [37], [38] according to the formal proof to verify the security of the proposed scheme. This tool uses the Dolev-Yao threat model as well as modifying encrypted schemes and is designed to forge information, automate authentication, and analyze the properties of security protocols [33].…”
Section: Formal Verification Via Scythermentioning
confidence: 99%
“…Furthermore, the BAN logic was used to verify the logical completeness of LAKE-IoD. Also, comparing LAKE-IoD with related designs, they showed that LAKE-IoD used less communication, computing, and overhead storage [29].…”
Section: Introductionmentioning
confidence: 99%
“…It is efficient because only the hash function is used for system encryption. Several papers briefly addressed security flaws of Sharma and Karla’s scheme [ 22 , 23 ]. However, they only mentioned briefly that privileged insider attacks are possible.…”
Section: Related Workmentioning
confidence: 99%