Journal
IEEE ACCESS
Volume 9, Issue -, Pages 53769-53785Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3070683
Keywords
Security; Protocols; Authentication; Servers; Drones; Resists; Intelligent sensors; UAV; Internet of Drones; lightweight authentication; Proverif; security
Categories
Funding
- Young and middle-aged teachers' basic ability improvement of Guangxi colleges in 2021 [2021KY1781]
- Scientific Research Project of Hunan Provincial Department of Education [19C0324]
Ask authors/readers for more resources
This study proposes an optimized lightweight identity security authentication protocol for Internet of Drones networks, aiming to ensure security through optimizing the utilization of computing resources.
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available