4.8 Article

A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 12, Pages 9918-9933

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3163367

Keywords

Authentication and key agreement; chaotic system; drone; Internet of Drones (IoD); physical unclonable function (PUF)

Funding

  1. NASA West Virginia EPSCoR [80NSSC20M0055]
  2. West Virginia HEPC's Division of Science and Research [dsr.20.1698-001]

Ask authors/readers for more resources

With the advancement of drone technology, Internet of Drones (IoD) has gained widespread applications in various fields. However, securing IoD systems can be challenging due to the unique characteristics of drones. In this article, a lightweight and privacy-preserving mutual authentication and key agreement protocol, PMAP, is proposed.
With accelerated advances in various technologies, drones, better known as unmanned aerial vehicles (UAVs), are increasingly commonplace and consequently have a more pronounced impact on society. For example, Internet of Drones (IoD), a new communication paradigm offering fundamental navigation assistance and access to information, has widespread applications ranging from agricultural drones in farming to surveillance drones in the COVID-19 pandemic. The increasingly prominent role of IoD in our society also reinforces the importance of securing such systems against various data privacy and security threats. Operationally, it can be challenging to adopt conventional off-the-shelf security products in an IoD system due to the underpinning characteristics of drones (e.g., dynamic and open communication channel). Therefore in this article, we propose a lightweight and privacy-preserving mutual authentication and key agreement protocol, hereafter referred to as PMAP. The latter uses a physical unclonable function (PUF) and chaotic system to support mutual authentication and establish a secure session key between communication entities in the IoD system. To be specific, PMAP consists of two schemes, namely: 1) PMAPD2Z (that mutually authenticates drone and zone service provider (ZSP) and establishes secure session keys) and 2) PMAPD2D (that mutually authenticates drones and establishes secure session keys). In addition, PMAP supports conditional privacy preserving so that the genuine identity of drones can only be revealed by trusted ZSPs. We evaluate the security of PMAP using automated validation of Internet security protocols and application (AVISPA), as well as provide formal and informal security analysis to show the resilience of PMAP against various security attacks. We also evaluate the performance of PMAP through extensive experiments and compare its performance with existing AKA and IBE-Lite schemes, whose findings show that PMAP achieves better performance in terms of computation cost, energy consumption, and communication overhead.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available