4.6 Article

A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 53769-53785

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3070683

Keywords

Security; Protocols; Authentication; Servers; Drones; Resists; Intelligent sensors; UAV; Internet of Drones; lightweight authentication; Proverif; security

Funding

  1. Young and middle-aged teachers' basic ability improvement of Guangxi colleges in 2021 [2021KY1781]
  2. Scientific Research Project of Hunan Provincial Department of Education [19C0324]

Ask authors/readers for more resources

This study proposes an optimized lightweight identity security authentication protocol for Internet of Drones networks, aiming to ensure security through optimizing the utilization of computing resources.
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available