Cargando…

Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments

Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. Howeve...

Descripción completa

Detalles Bibliográficos
Autores principales: Park, Yohan, Ryu, Daeun, Kwon, Deokkyu, Park, Youngho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9960845/
https://www.ncbi.nlm.nih.gov/pubmed/36850634
http://dx.doi.org/10.3390/s23042034
_version_ 1784895608906055680
author Park, Yohan
Ryu, Daeun
Kwon, Deokkyu
Park, Youngho
author_facet Park, Yohan
Ryu, Daeun
Kwon, Deokkyu
Park, Youngho
author_sort Park, Yohan
collection PubMed
description Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted from stolen mobile devices of remote users. Moreover, drones are susceptible to physical capture and manipulation by adversaries, which are called drone capture attacks. Thus, the development of a secure and lightweight authentication scheme is essential to overcoming these security vulnerabilities, even on resource-constrained drones. In 2021, Akram et al. proposed a secure and lightweight user–drone authentication scheme for drone networks. However, we discovered that Akram et al.’s scheme is susceptible to user and drone impersonation, verification table leakage, and denial of service (DoS) attacks. Furthermore, their scheme cannot provide perfect forward secrecy. To overcome the aforementioned security vulnerabilities, we propose a secure mutual authentication and key agreement scheme between user and drone pairs. The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. Moreover, the proposed scheme uses a fuzzy extractor to utilize the biometrics of users as secret parameters. We analyze the security of the proposed scheme using informal security analysis, Burrows–Abadi–Needham (BAN) logic, a Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. We also compared the security features and performance of the proposed scheme and the existing related schemes. Therefore, we demonstrate that the proposed scheme is suitable for IoD environments that can provide users with secure and convenient wireless communications.
format Online
Article
Text
id pubmed-9960845
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-99608452023-02-26 Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments Park, Yohan Ryu, Daeun Kwon, Deokkyu Park, Youngho Sensors (Basel) Article Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted from stolen mobile devices of remote users. Moreover, drones are susceptible to physical capture and manipulation by adversaries, which are called drone capture attacks. Thus, the development of a secure and lightweight authentication scheme is essential to overcoming these security vulnerabilities, even on resource-constrained drones. In 2021, Akram et al. proposed a secure and lightweight user–drone authentication scheme for drone networks. However, we discovered that Akram et al.’s scheme is susceptible to user and drone impersonation, verification table leakage, and denial of service (DoS) attacks. Furthermore, their scheme cannot provide perfect forward secrecy. To overcome the aforementioned security vulnerabilities, we propose a secure mutual authentication and key agreement scheme between user and drone pairs. The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. Moreover, the proposed scheme uses a fuzzy extractor to utilize the biometrics of users as secret parameters. We analyze the security of the proposed scheme using informal security analysis, Burrows–Abadi–Needham (BAN) logic, a Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. We also compared the security features and performance of the proposed scheme and the existing related schemes. Therefore, we demonstrate that the proposed scheme is suitable for IoD environments that can provide users with secure and convenient wireless communications. MDPI 2023-02-10 /pmc/articles/PMC9960845/ /pubmed/36850634 http://dx.doi.org/10.3390/s23042034 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Park, Yohan
Ryu, Daeun
Kwon, Deokkyu
Park, Youngho
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
title Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
title_full Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
title_fullStr Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
title_full_unstemmed Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
title_short Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
title_sort provably secure mutual authentication and key agreement scheme using puf in internet of drones deployments
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9960845/
https://www.ncbi.nlm.nih.gov/pubmed/36850634
http://dx.doi.org/10.3390/s23042034
work_keys_str_mv AT parkyohan provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments
AT ryudaeun provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments
AT kwondeokkyu provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments
AT parkyoungho provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments