4.6 Article

Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System

Jongseok Ryu et al.

Summary: This paper proposes a secure ECC-based three-factor mutual authentication protocol for TMIS that guarantees patient privacy. The protocol is proven to be secure through various security analyses and outperforms existing protocols in terms of communication costs and security features.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones

Muhammad Tanveer et al.

Summary: The revolutionary advancement in hardware tools, software packages, and communication techniques has led to the rise of Internet of Things-supported drone networks (IoD). However, new security threats arise as the infrastructure of IoD becomes more sophisticated. In this paper, we propose a novel user authentication mechanism called RUAM-IoD, which utilizes elliptic curve cryptography, symmetric encryption, and hash function. We validate the security of RUAM-IoD through formal and informal analysis, and compare it with other state-of-the-art authentication schemes.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain

Durbadal Chattaraj et al.

Summary: This article proposes a new private blockchain-enabled fine-grained access control mechanism for the SDN environment, incorporating attribute-based encryption and certificate-based access control protocol. The proposed solution can resist several well-known security threats and alleviate system-level inconveniences.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones

Muhammad Tanveer et al.

Summary: This article proposes a robust authenticated key management (AKM) protocol for Internet of Drones (IoD) environment, called RAMP-IoD. RAMP-IoD utilizes lightweight cryptography-based authenticated encryption, elliptic-curve cryptography, and hash function to ensure reliable and secure communication. It verifies user authenticity and establishes an indecipherable session key (SK) for communication. Security analysis shows that RAMP-IoD is protected against replay and man-in-the-middle attacks, and is secure against various covert security attacks. Comparative study demonstrates that RAMP-IoD provides enhanced security with low storage, communication, and computational overheads compared to related AKM protocols.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Multidisciplinary

Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET

Seunghwan Son et al.

Summary: Connected vehicle refers to providing various services through vehicles connected to the network. Vehicular ad-hoc networks (VANETs) can support vehicle-to-vehicle and vehicle-to-infrastructure communications to realize connected vehicles. Secure communication is crucial in VANETs to prevent accidents and injuries. Recent studies have focused on V2I authentication to ensure the security of V2I communications. However, existing protocols do not consider the handover situation, leading to unnecessary computations and resource overload. A blockchain-based VANET protocol is proposed to address these issues and improve efficiency. The protocol only requires lightweight computations during handover situations, and formal analysis and simulations demonstrate its practicality. Comparisons with existing protocols show that the proposed protocol is more secure and efficient.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Engineering, Civil

A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance

Muhammad Wahid Akram et al.

Summary: The advancement of ICT and the Internet has facilitated the use of Unmanned Aerial Vehicles (UAVs) in assisting Vehicular Ad-hoc Networks (VANETs), providing real-time data access and monitoring capabilities in smart cities. However, security, privacy, and routing concerns remain significant challenges for UAV-assisted VANETs, where Deep Learning Algorithms (DLAs) can play a vital role.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

Design of Secure Handover Authentication Scheme for Urban Air Mobility Environments

Deokkyu Kwon et al.

Summary: This paper presents a secure and efficient handover authentication scheme for UAM environments, using elliptic curve cryptography and multiple security verification methods. The research results indicate that the proposed scheme is both secure and efficient in UAM environments.

IEEE ACCESS (2022)

Article Remote Sensing

Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

Tsuyang Wu et al.

Summary: The emergence of the Internet of Drones (IoD) as an extension of the Internet of Things (IoT) has allowed for faster and more secure data transmission through the use of 5G technology. However, existing authentication protocols have security vulnerabilities. Through the design of an improved protocol and thorough analysis and verification, the security of the protocol is found to be satisfactory.

DRONES (2022)

Review Engineering, Electrical & Electronic

Applications, Deployments, and Integration of Internet of Drones (IoD): A Review

Laith Abualigah et al.

Summary: The Internet of Drones (IoD) has gained significant attention in recent years for its wide potential applications. This paper provides a comprehensive survey of IoD and its applications, deployments, and integration, focusing on smart cities surveillance, cloud and fog frameworks, unmanned aerial vehicles, wireless sensor networks, networks, mobile computing, and business paradigms. Discussions highlight hot research topics and problems to guide future research in this area.

IEEE SENSORS JOURNAL (2021)

Article Engineering, Electrical & Electronic

Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF

Muhammad Umar et al.

Summary: The article introduces a lightweight privacy-preserving authentication protocol for VANETs, which is compared to existing protocols, lighter, safer, and more practical, making it more reliable and convenient for secure data transmission in VANETs.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System

Palak Bagga et al.

Summary: Internet of Vehicles (IoV) is a distributed network consisting of connected vehicles and Vehicular Ad Hoc Networks (VANETs) with real-time communication, anonymity, security features. In an Intelligent Transportation System, a new authentication and key agreement protocol is proposed, which has been shown to be secure against various attacks through security analysis and verification, offering lower communication and computational overheads, better security and functionality attributes than other competing schemes.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Chemistry, Analytical

WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks

Deok Kyu Kwon et al.

Summary: The importance of secure authentication in WSN was discussed, with the introduction of Moghadam et al.'s protocol and its identified vulnerabilities, and the proposal of WSN-SLAP as an alternative solution to address these issues.

SENSORS (2021)

Article Computer Science, Information Systems

An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones

Naijian Zhang et al.

Summary: The Internet of Drones (IoD) has gained popularity in various fields due to the mobility, flexibility, and autonomy of drones, but faces new security challenges and privacy issues. An efficient three-factor AKA protocol based on FourQ and BPV pre-calculation is proposed in this study to authenticate remote users and establish session keys for IoD. Real-world experiments demonstrate that the improved FourQ curve primitive is significantly faster than conventional elliptic curve primitives, providing stronger security and higher efficiency compared to existing protocols.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Design of Secure Decentralized Car-Sharing System Using Blockchain

Myeonghyun Kim et al.

Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

R. Shashidhara et al.

Summary: A secure authentication protocol is crucial for securing communications over wireless and mobile networks due to their susceptibility to various attacks. By analyzing the vulnerabilities in existing authentication systems, a more efficient and robust authentication system for roaming in mobility networks is proposed to address these security flaws.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications

Yoney Kirsal Ever

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks

Tejasvi Alladi et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A smart lightweight privacy preservation scheme for IoT-based UAV communication systems

B. D. Deebak et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Security and Privacy for the Internet of Drones: Challenges and Solutions

Chao Lin et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Theory & Methods

Zipf's Law in Passwords

Ding Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Internet of Drones

Mirmojtaba Gharibi et al.

IEEE ACCESS (2016)

Article Engineering, Electrical & Electronic

Physical Unclonable Functions and Applications: A Tutorial

Charles Herder et al.

PROCEEDINGS OF THE IEEE (2014)