Cargando…

An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications

In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the cont...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Chun-Ta, Weng, Chi-Yao, Chen, Chin-Ling, Lee, Cheng-Chi, Deng, Yong-Yuan, Imoize, Agbotiname Lucky
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9736828/
https://www.ncbi.nlm.nih.gov/pubmed/36502237
http://dx.doi.org/10.3390/s22239534
_version_ 1784847130998865920
author Li, Chun-Ta
Weng, Chi-Yao
Chen, Chin-Ling
Lee, Cheng-Chi
Deng, Yong-Yuan
Imoize, Agbotiname Lucky
author_facet Li, Chun-Ta
Weng, Chi-Yao
Chen, Chin-Ling
Lee, Cheng-Chi
Deng, Yong-Yuan
Imoize, Agbotiname Lucky
author_sort Li, Chun-Ta
collection PubMed
description In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the controller from a designated environment via wireless communication technologies. The mobility, flexibility, reliability and energy efficiency of drones makes them more widely used in IoT environments such as commercial, military, entertainment applications, traffic surveillance and aerial photography. In a generalized IoD architecture, we have communications among the drones in a flying zone, among the drones and the control server, and also among the drones and authorized user. IoD still has many critical issues that need to be addressed, such as data access being carried out through a public channel and battery operated drones. To address these concerns in IoD communications, in this paper, an efficient authentication and secure communication scheme with privacy preservation is proposed and it only uses secure one-way hash function and bitwise XOR operations when control server, drone and user mutually authenticate each other. After the successful authentication, both IoD-based participants can agree on a common session key to secure the subsequent communication messages. The widely accepted ProVerif and BAN logic analysis have been used to assure that the proposed scheme is provably secure against existing well-known security attacks and ensures privacy. Finally, a comparative analysis is presented to demonstrate the proposed scheme preserves efficiency when compared to existing competitive schemes.
format Online
Article
Text
id pubmed-9736828
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97368282022-12-11 An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications Li, Chun-Ta Weng, Chi-Yao Chen, Chin-Ling Lee, Cheng-Chi Deng, Yong-Yuan Imoize, Agbotiname Lucky Sensors (Basel) Article In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the controller from a designated environment via wireless communication technologies. The mobility, flexibility, reliability and energy efficiency of drones makes them more widely used in IoT environments such as commercial, military, entertainment applications, traffic surveillance and aerial photography. In a generalized IoD architecture, we have communications among the drones in a flying zone, among the drones and the control server, and also among the drones and authorized user. IoD still has many critical issues that need to be addressed, such as data access being carried out through a public channel and battery operated drones. To address these concerns in IoD communications, in this paper, an efficient authentication and secure communication scheme with privacy preservation is proposed and it only uses secure one-way hash function and bitwise XOR operations when control server, drone and user mutually authenticate each other. After the successful authentication, both IoD-based participants can agree on a common session key to secure the subsequent communication messages. The widely accepted ProVerif and BAN logic analysis have been used to assure that the proposed scheme is provably secure against existing well-known security attacks and ensures privacy. Finally, a comparative analysis is presented to demonstrate the proposed scheme preserves efficiency when compared to existing competitive schemes. MDPI 2022-12-06 /pmc/articles/PMC9736828/ /pubmed/36502237 http://dx.doi.org/10.3390/s22239534 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Li, Chun-Ta
Weng, Chi-Yao
Chen, Chin-Ling
Lee, Cheng-Chi
Deng, Yong-Yuan
Imoize, Agbotiname Lucky
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
title An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
title_full An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
title_fullStr An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
title_full_unstemmed An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
title_short An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
title_sort efficient authenticated key agreement scheme supporting privacy-preservation for internet of drones communications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9736828/
https://www.ncbi.nlm.nih.gov/pubmed/36502237
http://dx.doi.org/10.3390/s22239534
work_keys_str_mv AT lichunta anefficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT wengchiyao anefficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT chenchinling anefficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT leechengchi anefficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT dengyongyuan anefficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT imoizeagbotinamelucky anefficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT lichunta efficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT wengchiyao efficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT chenchinling efficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT leechengchi efficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT dengyongyuan efficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications
AT imoizeagbotinamelucky efficientauthenticatedkeyagreementschemesupportingprivacypreservationforinternetofdronescommunications