Journal
IEEE ACCESS
Volume 10, Issue -, Pages 17134-17144Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3150035
Keywords
Drones; Protocols; Authentication; Security; Encryption; Internet; Wireless sensor networks; Internet of Drones (IoD); anonymity; pseudonymity; unlinkability; authentication; key agreement; forward secrecy
Categories
Funding
- Military Crypto Research Center - Defense Acquisition Program Administration (DAPA) [UD210027XD]
- Agency for Defense Development (ADD)
- Korea University
Ask authors/readers for more resources
The text discusses the importance of establishing a session key between users and drones to ensure authentication and secure channels in IoD environments. It also considers potential drone capture attacks and emphasizes the need for forward unlinkability and forward secrecy in key exchanges to minimize damage. The paper proposes key agreement protocols that provide both pseudonymity and forward unlinkability, enhancing privacy and security for users and drones.
Many applications are equipped to utilize drones to provide various services to users in Internet of Drones (IoD) environments. In such applications, it is necessary to make a session key between a drone and a user to establish an authenticated and secure channel. It is also desirable to provide strong anonymity to increase user(drone) privacy. To provide robust anonymity, a protocol has to provide both pseudonymity and unlinkability. If a protocol provides only pseudonymity without unlinkability, user(drone) privacy could be breached by analyzing communication frequency or user(drone) movement. On the other hand, we consider drone capture attacks in the IoD, because if a drone is captured, the secret information of the drone could be revealed. To minimize the damage against the capturing attacks, a key exchange should provide the forward unlinkability as well as forward secrecy. Forward unlinkability means that even though the secret information of the drone is revealed, the unlinkability is guaranteed. In the paper, we suggest the first key agreement protocols providing both pseudonymity and forward unlinkability, whereas previous key agreement protocols provide only pseudonymity and unlinkability.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available