Cargando…
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. Howeve...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9960845/ https://www.ncbi.nlm.nih.gov/pubmed/36850634 http://dx.doi.org/10.3390/s23042034 |
_version_ | 1784895608906055680 |
---|---|
author | Park, Yohan Ryu, Daeun Kwon, Deokkyu Park, Youngho |
author_facet | Park, Yohan Ryu, Daeun Kwon, Deokkyu Park, Youngho |
author_sort | Park, Yohan |
collection | PubMed |
description | Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted from stolen mobile devices of remote users. Moreover, drones are susceptible to physical capture and manipulation by adversaries, which are called drone capture attacks. Thus, the development of a secure and lightweight authentication scheme is essential to overcoming these security vulnerabilities, even on resource-constrained drones. In 2021, Akram et al. proposed a secure and lightweight user–drone authentication scheme for drone networks. However, we discovered that Akram et al.’s scheme is susceptible to user and drone impersonation, verification table leakage, and denial of service (DoS) attacks. Furthermore, their scheme cannot provide perfect forward secrecy. To overcome the aforementioned security vulnerabilities, we propose a secure mutual authentication and key agreement scheme between user and drone pairs. The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. Moreover, the proposed scheme uses a fuzzy extractor to utilize the biometrics of users as secret parameters. We analyze the security of the proposed scheme using informal security analysis, Burrows–Abadi–Needham (BAN) logic, a Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. We also compared the security features and performance of the proposed scheme and the existing related schemes. Therefore, we demonstrate that the proposed scheme is suitable for IoD environments that can provide users with secure and convenient wireless communications. |
format | Online Article Text |
id | pubmed-9960845 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-99608452023-02-26 Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments Park, Yohan Ryu, Daeun Kwon, Deokkyu Park, Youngho Sensors (Basel) Article Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted from stolen mobile devices of remote users. Moreover, drones are susceptible to physical capture and manipulation by adversaries, which are called drone capture attacks. Thus, the development of a secure and lightweight authentication scheme is essential to overcoming these security vulnerabilities, even on resource-constrained drones. In 2021, Akram et al. proposed a secure and lightweight user–drone authentication scheme for drone networks. However, we discovered that Akram et al.’s scheme is susceptible to user and drone impersonation, verification table leakage, and denial of service (DoS) attacks. Furthermore, their scheme cannot provide perfect forward secrecy. To overcome the aforementioned security vulnerabilities, we propose a secure mutual authentication and key agreement scheme between user and drone pairs. The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. Moreover, the proposed scheme uses a fuzzy extractor to utilize the biometrics of users as secret parameters. We analyze the security of the proposed scheme using informal security analysis, Burrows–Abadi–Needham (BAN) logic, a Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. We also compared the security features and performance of the proposed scheme and the existing related schemes. Therefore, we demonstrate that the proposed scheme is suitable for IoD environments that can provide users with secure and convenient wireless communications. MDPI 2023-02-10 /pmc/articles/PMC9960845/ /pubmed/36850634 http://dx.doi.org/10.3390/s23042034 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Park, Yohan Ryu, Daeun Kwon, Deokkyu Park, Youngho Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments |
title | Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments |
title_full | Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments |
title_fullStr | Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments |
title_full_unstemmed | Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments |
title_short | Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments |
title_sort | provably secure mutual authentication and key agreement scheme using puf in internet of drones deployments |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9960845/ https://www.ncbi.nlm.nih.gov/pubmed/36850634 http://dx.doi.org/10.3390/s23042034 |
work_keys_str_mv | AT parkyohan provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments AT ryudaeun provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments AT kwondeokkyu provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments AT parkyoungho provablysecuremutualauthenticationandkeyagreementschemeusingpufininternetofdronesdeployments |