Abstract

The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security.

Highlights

  • The Internet of Things is an overall system consisting of a series of smart devices that interact through the network, where the smart devices have strong processing and communication capabilities and have locatable Internet Protocol addresses (IP addresses) [1]

  • Pu and Li (2020) [13] proposed the mutual authentication protocol asPCAP based on physical unclonable function (PUF), we found that the protocol proposed in this paper does not have complete forward security

  • We found that detailed authentication for both forward and backward security of the protocols is rarely found in any of the current proposed protocols in the current study

Read more

Summary

INTRODUCTION

Mobile nodes (UAV, sensors, etc.), as an embedded device, are subject to large limitations on their computing power and resources, and the too frequent and complex authentication mechanism will inevitably affect the execution of their own functions and the endurance of the device It is an important issue in the field of IoD security to ensure the security of the network environment, avoid the loss of people and properties due to network attacks and information leakage, and reduce the consumption of security mechanism operation as much as possible, so as to improve the operational efficiency of smart devices. 3) All mobile nodes in the IoD network, including AP, sensors N and UAV, are constrained by the resource environment and may be subject to malicious physical damage by attackers, resulting in the leakage of the data stored in their media. All security parameters are not transmitted in the network and are stored locally by the Server

REGISTRATION PHASE
COMPARISON OF SECURITY WITH OTHER PROTOCOLS
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call