4.6 Article

An Efficient and Reliable User Access Protocol for Internet of Drones

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

An efficient lightweight authentication scheme for human-centered industrial Internet of Things

Jaya Singh et al.

Summary: The Internet of Things (IoT) allows for the integration of diverse nodes, bringing advancements in technology for industrial and government services. In this paper, a lightweight and secure authentication protocol for human-centered industrial IoT (IIoT) is proposed, aiming to enhance the development and manufacturing of industrial processes. The protocol includes authentication, secure key exchange, and communication processes, reducing computational overhead and addressing potential attacks.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2023)

Article Computer Science, Information Systems

LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

Muhammad Tanveer et al.

Summary: This article introduces a lightweight user AKE scheme (LAKE-6SH) for smart home networks, which establishes private session keys between users and network entities to achieve authenticity of RUs using the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. The scheme has been informally validated to be secure against various security attacks, and further validated formally through the random oracle model and Scyther validation. Additionally, LAKE-6SH is shown to provide better security features with low communication and computational overheads.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones

Muhammad Tanveer et al.

Summary: This article proposes a robust authenticated key management (AKM) protocol for Internet of Drones (IoD) environment, called RAMP-IoD. RAMP-IoD utilizes lightweight cryptography-based authenticated encryption, elliptic-curve cryptography, and hash function to ensure reliable and secure communication. It verifies user authenticity and establishes an indecipherable session key (SK) for communication. Security analysis shows that RAMP-IoD is protected against replay and man-in-the-middle attacks, and is secure against various covert security attacks. Comparative study demonstrates that RAMP-IoD provides enhanced security with low storage, communication, and computational overheads compared to related AKM protocols.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

On the Security of an ECC-Based Authentication Scheme for Internet of Drones

Min Zhang et al.

Summary: This article demonstrates the vulnerabilities of the ECC-based authentication scheme for Internet of Drones, showing that it fails to prevent drone impersonation attacks and allows adversaries to compromise the session key of a target user and their drone.

IEEE SYSTEMS JOURNAL (2022)

Article Engineering, Electrical & Electronic

SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments

Sungjin Yu et al.

Summary: With the emergence of smart cities and the increasing demand for drones, the Internet of Drones (IoD) has gained attention for its benefits in academia and industry. However, communication among drones in IoD-based smart city environments is vulnerable to security threats. To address this, a secure and lightweight authentication protocol called SLAP-IoD is proposed, which uses a physical unclonable function (PUF) to ensure reliable and useful services in smart city environments.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance

Mahdi Nikooghadam et al.

Summary: In smart cities, surveillance using drones requires a secure authentication scheme to ensure data security, which should be efficient in terms of computation overhead while providing high security.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Computer Science, Hardware & Architecture

GCACS-IoD: A certificate based generic access control scheme for Internet of drones

Shehzad Ashraf Chaudhry et al.

Summary: The Internet of Drones (IoD) is increasingly important in various fields, but security and privacy issues are crucial. Research has shown vulnerabilities in current access control schemes, leading to the proposal of a new, more secure solution.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments

Zeeshan Ali et al.

Summary: In smart cities, drones are integrated into the Internet of Drones (IoD) to provide real-time data to users through traditional cellular networks. However, the sensitive data collected by drones face security threats, prompting the need for a secure authentication scheme. The TC-PSLAP protocol is proposed in this article to secure drone communication, which has been proven secure using verification tools like AVISPA and BAN logic, and shown to resist known attacks.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Construction & Building Technology

An anonymous device to device access control based on secure certificate for internet of medical things systems

Shehzad Ashraf Chaudhry et al.

Summary: The Internet of Medical Things (IoMT) is based on sensing and communication infrastructure as well as computation facilities, providing convenient and cost-effective ways for healthcare by enabling remote access to patients' physiological data. However, communication delays in IoMT can be very harmful to healthcare.

SUSTAINABLE CITIES AND SOCIETY (2021)

Article Computer Science, Information Systems

Provably secure biometric-based client-server secure communication over unreliable networks

Muhammad Asad Saleem et al.

Summary: The article discusses how the advancement of internet technologies has made remote access more convenient, and proposes a three-factor authentication scheme to prevent various security attacks. Experimental results show that the proposed scheme is more lightweight and efficient in terms of computation and communication costs compared to related competing schemes.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Article Computer Science, Information Systems

A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework

Azeem Irshad et al.

Summary: Mobile cloud computing has changed the service provisioning of applications, requiring efficient authenticated key agreements. Recent multi-server authentication schemes for MCC aim to enhance security adaptation, but some are insecure or too costly to implement. This study proposes a novel pairing-free authentication protocol based on elliptic curve cryptography for MCC, demonstrating efficiency and security.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

Sajid Hussain et al.

Summary: Continuous innovation and advancement in hardware, software, and communication technologies have led to the expansion and accelerated growth of Internet of Things-based drone networks, facilitating communication and data sharing among devices, applications, and people. IoD can enhance convenience in various applications including daily life, commercial, and military/rescue operations in smart cities. New customized solutions are needed to address security threats in IoD, with a proposed authentication scheme using elliptic curve cryptography and a discussion on its security aspects.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment

Ashok Kumar Das et al.

Summary: The proposed generic access control scheme GCACS-IoD has critical security vulnerabilities, making the network susceptible to attacks. An improved scheme iGCACS-IoD has been suggested to address these vulnerabilities and has been demonstrated through formal security verification and NS2 simulation study.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A lightweight authentication and key agreement scheme for Internet of Drones

Yunru Zhang et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A robust authentication and access control protocol for securing wireless healthcare sensor networks

Zeeshan Ali et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Review Multidisciplinary Sciences

Internet of Things and Its Applications: A Comprehensive Survey

Rosilah Hassan et al.

SYMMETRY-BASEL (2020)

Article Engineering, Electrical & Electronic

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices

Muhammad Faizan Ayub et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2020)

Article Computer Science, Information Systems

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment

Muhammad Tanveer et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

Security analysis of drones systems: Attacks, limitations, and recommendations

Jean-Paul Yaacoub et al.

INTERNET OF THINGS (2020)

Article Chemistry, Analytical

Authentication and Delegation for Operating a Multi-Drone System

Mungyu Bae et al.

SENSORS (2019)

Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment

Soumya Banerjee et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Editorial Material Computer Science, Information Systems

Comments on Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Sajid Hussain et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Information Systems

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor

S. K. Hafizul Islam et al.

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Review Computer Science, Information Systems

Authentication Protocols for Internet of Things: A Comprehensive Survey

Mohamed Amine Ferrag et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Telecommunications

Packet Loss and Packet Delivery Evaluation Using Network Simulator for Multicast Enabled Network Mobility Management

Azana Hafizah Mohd Aman et al.

INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING (2017)

Article Engineering, Electrical & Electronic

An anonymous and provably secure authentication scheme for mobile user

S. K. Hafizul Islam et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2016)

Article Computer Science, Information Systems

Internet of Drones

Mirmojtaba Gharibi et al.

IEEE ACCESS (2016)