4.7 Article

A secure and lightweight batch authentication scheme for Internet of Drones environment

期刊

VEHICULAR COMMUNICATIONS
卷 44, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.vehcom.2023.100680

关键词

Internet of Drones (IoD); Batch authentication; One-to-many; PUFs; Key agreement

向作者/读者索取更多资源

This research proposes a lightweight authentication scheme that supports batch authentication of multiple drones, improving efficiency and security of authentication. Batch authentication is achieved using hash function and point multiplication, and physical unclonable functions are introduced to resist physical attacks. Security analyses demonstrate the scheme's resilience against known attacks, and experimental results show better security and lower overheads compared to existing schemes for authenticating multiple drones.
Internet of Drones (IoD) ushered in a rapid growth period and is gradually expanded from military field to civilian field. Currently, there are more and more scenarios where multiple drones are needed to complete a task together. Usually, identity authentication is required to ensure the execution of the task. The existing authentication schemes are basically aimed at the authentication of a single drone. For the multiple-drones scenario, the authentication protocol needs to be executed one by one for all the participating drones, which is extremely inefficient and will directly affect the efficiency of task execution. Therefore, we propose a novel lightweight authentication scheme, which supports users' batch authentication of multiple drones to ensure high efficiency of authentication. In our scheme, we only use hash function and point multiplication to complete batch authentication. In addition, Physical Unclonable Functions (PUFs) are introduced into our scheme to resist physical capture attack. Furthermore, our formal and informal security analyses reveal that our scheme can withstand most known attacks. The experimental result shows that our scheme can provide better security and lower storage and computation overheads when authenticating multiple drones, as compared with existing similar schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据