Abstract

Internet of Things (IoT) is widely utilized to plenty of domains such as agriculture and meteorology. IoT technologies can be applied to drones to form Internet of Drones (IoD). In IoD, drones can help the government to gather or transmit data for disaster relief, investigation of terrain, military, fire detection and so on. In order to protect the security of data transmission for IoD, Zhang et al. proposed a lightweight authentication and key agreement scheme by using only XOR operation and one-way hash function to resist known attacks. They claimed that their scheme could effectively reduce communication and computation cost. After analyzing their scheme, we find that their scheme is vulnerable to compromised user anonymity, denial-of-service attack and replay attack. In this paper, how these found security flaws threaten Zhang et al.’s scheme is shown in detail.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call