4.6 Article

Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

Journal

IEEE SYSTEMS JOURNAL
Volume 15, Issue 3, Pages 4431-4438

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2021.3057047

Keywords

Drones; Security; Authentication; Internet of Things; Biometrics (access control); Surveillance; Elliptic curve cryptography; Authentication; drone capture attack; Internet of Drones (IoD); Internet of Things (IoT) security; key-agreement; provable security; smart city security; three-factor authentication

Funding

  1. King Saud University, Riyadh, Saudi Arabia [RSP2020/12]

Ask authors/readers for more resources

Continuous innovation and advancement in hardware, software, and communication technologies have led to the expansion and accelerated growth of Internet of Things-based drone networks, facilitating communication and data sharing among devices, applications, and people. IoD can enhance convenience in various applications including daily life, commercial, and military/rescue operations in smart cities. New customized solutions are needed to address security threats in IoD, with a proposed authentication scheme using elliptic curve cryptography and a discussion on its security aspects.
The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and military/rescue operations in smart cities. However, this growth in infrastructure smartness is also subject to new security threats and the countermeasures require new customized solutions for IoD. Many schemes to secure IoD environments are proposed recently; however, some of those were proved as insecure and some degrades the efficiency. In this article, using elliptic curve cryptography, we proposed a new authentication scheme to secure the communication between a user and a drone flying in some specific flying zone. The security of the proposed scheme is solicited using formal Random oracle method along with a brief discussion on security aspects provided by proposed scheme. Finally, the comparisons with some related and latest schemes is illustrated.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available