Abstract

Drones are of different shapes, sizes, characteristics, and configurations. It can be classified for the purpose of its deployment, either in the civilian or military domain. The earliest usage of drones was totally for military purposes, but manufacturers promptly tested it for civilian fields like border surveillance, disaster relief, pipeline relief, and security. Drone’s manufacturing, equipment installation, power supply, multi-rotor system, and embedded sensors are not the pressing issues for researchers of drone technologies. What is required is to utilize a drone for a complex operation and ensure secured data broadcasting among drones with the ground control station via a self-organized, resourceless, and infrastructureless network (Flying Ad Hoc Networks (FANET)). These operations are no less important in areas like emergency, search and rescue operations, border surveillance, and physical phenomenon sensing for the end-user. However, it is not without some challenges for the researchers keeping in view the threats these operations are exposed to concerning security issues and challenges. To overcome these challenges, the designers have to strive towards a secured drone operation by developing a robust and lightweight key agreement protocol for IoD deployment civilian drone. Consequently, the researchers in this study have attempted to design a verifiably secure and lightweight authentication scheme for IoD deployment civilian drones. The proposed security protocol has been verified by ProVerif2.02 and Real-Or-Random (ROR) model, while its performance scenario has been tackled by considering storage, computation, and communication overheads analysis. In comparing the proposed framework with prior protocols, it has been demonstrated that the scheme is quite efficient and may be recommended for operations in a given IoD environment.

Highlights

  • Internet-of-Drones (IoD) environment is operationalized for providing secure flying services to drones within the jurisdiction of the ground control station

  • In this paper, the researchers propose a simple cryptographic authentication scheme for FANET based on public key infrastructure (PKI)

  • RELATED WORKS Sun et al [10] demonstrated that a robust authentication mechanism is needed if unmanned aerial vehicles are operationalized in a cluster, and each UAV sends data security to the cluster head

Read more

Summary

INTRODUCTION

Internet-of-Drones (IoD) environment is operationalized for providing secure flying services to drones within the jurisdiction of the ground control station. In this paper, the researchers propose a simple cryptographic authentication scheme for FANET based on public key infrastructure (PKI). The key exchange is necessary because the publicprivate-key pair for encryption/decryption needs to be dynamically updated for the upcoming session, which is probably an appropriate choice Because it allows IoD’s participants to generate a mutually computed session key through a public network channel. Given the shortcomings of the available schemes, merits of PKI, and the need for a more efficient one motivated us to design a verifiably secure, lightweight, and robust authentication scheme for IoD deployment civilian drone. 2. IoD’s participants (e.g., U, D, and GCS), after completing mutual authentication, create a session key between them to be used in subsequent communications. The scheme should be effective in terms of low computation and communication costs

RELATED WORKS
PROPOSED SCHEME
KEY-AGREEMENT PHASE
DYNAMIC DRONE ADDITION PHASE
DRONE REVOCATION PHASE
PERFORMANCE ANALYSIS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call