2023
DOI: 10.3390/s23042034
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments

Abstract: Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…According to [42], the execution time for the different millisecond operations is shown in Table IV and graphically in Figure 4. The proposed scheme is 26.02% better in communication costs than [35], 15.62% from [38] and 32.5% from [40], while in terms of computation costs, the proposed scheme is 91.70% better than [35], 78.63% than [38] and 11.92% than [40]. Overall, the proposed protocol outperforms better than its competitors, as shown in Table IV Similarly, upon comparing the proposed scheme with [35], [38], and [40], in terms of security functionalities including I-Impersonation Attack, II-MITM Attack, III-Attack detection, IV-Forward Secrecy, V-Backward Secrecy, VI-Mutual Authentication, VII-Traceability Attack, VIII-Insider Attack, IX-Stolen-Verifier Attack, X-Password Guessing Attack, XI-DoS Attack, and XII-Replay Attack, ✓-Supported and X -Not Supported.…”
Section: B Computation Costs Analysismentioning
confidence: 95%
See 1 more Smart Citation
“…According to [42], the execution time for the different millisecond operations is shown in Table IV and graphically in Figure 4. The proposed scheme is 26.02% better in communication costs than [35], 15.62% from [38] and 32.5% from [40], while in terms of computation costs, the proposed scheme is 91.70% better than [35], 78.63% than [38] and 11.92% than [40]. Overall, the proposed protocol outperforms better than its competitors, as shown in Table IV Similarly, upon comparing the proposed scheme with [35], [38], and [40], in terms of security functionalities including I-Impersonation Attack, II-MITM Attack, III-Attack detection, IV-Forward Secrecy, V-Backward Secrecy, VI-Mutual Authentication, VII-Traceability Attack, VIII-Insider Attack, IX-Stolen-Verifier Attack, X-Password Guessing Attack, XI-DoS Attack, and XII-Replay Attack, ✓-Supported and X -Not Supported.…”
Section: B Computation Costs Analysismentioning
confidence: 95%
“…Park et al [40] Fuzzy extractor, PUF, hash, and XOR functions were used to design a mutual authentication and key-agreement scheme for the IoD environment.…”
Section: Singh Et Al [38]mentioning
confidence: 99%
“…Therefore, IoT objects such as smart devices need significant resources to store data collected from sensors and perform real-time computations using limited hardware. Hence, addressing the limitations of storage and computing capacities is crucial for the formation of a network of IoT objects [ 3 , 4 , 5 ]. However, cloud computing technology refers to the practice of moving computational power and storage space from individual devices to larger shared data centers [ 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…As a hardware primitive, PUF utilizes process variations during chip manufacturing to generate a unique device ID [ 6 ], and it has advantages such as being lightweight, easy to implement, and without the need for storage of responses. Therefore, it is suitable for authentication protocols in resource-constrained IoT environments [ 7 , 8 ]. PUF can be classified into weak PUF and strong PUF according to the number of the Challenge Response Pairs (CRPs).…”
Section: Introductionmentioning
confidence: 99%