4.6 Article

An Efficient and Reliable User Access Protocol for Internet of Drones

Journal

IEEE ACCESS
Volume 11, Issue -, Pages 59688-59700

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2023.3284832

Keywords

Key agreement; authentication; security; Internet of Drones; proverif

Ask authors/readers for more resources

This article investigates the application of the Internet of Drones (IoD) in military and civil fields and emphasizes the need for a secure and efficient authentication protocol in order to ensure authorized communication and data transmission. The author introduces an enhanced, lightweight, and secure protocol to overcome the limitations of existing protocols and demonstrates through performance comparison that the proposed scheme provides improved security with minimal computation cost. Formal automated analysis using ProVerif confirms that the proposed scheme is resilient against various attacks.
The Internet of Drones (IoD) has blown up the interest of academia and industry due to their deployment in military and civil fields. In the IoD environment, drones collect and transmit real-time data to the users through an insecure wireless medium. A secure and efficient authentication protocol is required to ensure that only authorized drones communicate and send data to authentic users. For this purpose, Zhang et al. introduced an authentication protocol for the IoD environment and asserted that it could hold out against many known attacks. However, after cautious scrutiny, this paper manifests that many shortcomings still exist in their protocol design. This article introduces an enhanced, lightweight, and secure protocol for the IoD environment to mitigate the drawbacks of Zhang et al.'s protocol. The performance comparison depicts that the proposed scheme provides enhanced security with minimal computation cost. This rise in communication cost is legitimate as the proposed protocol renders better protection than the preceding protocols. The formal automated analysis is carried out via ProVerif to prove that the proposed scheme withstands numerous attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available