Abstract

At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.

Highlights

  • In the past decade, the development of artificial intelligence [1,2,3] and network has witnessed significant advances

  • We proved that the protocol can resist known security attacks

  • This paper first summarizes the importance and combination of Internet of Drones (IoD) and 5G, reviews the recent AKA protocol in IoD and briefly reviews the protocol of Hussain et al [21], pointing out that Hussain et al.’s protocol [21] is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks

Read more

Summary

Introduction

The development of artificial intelligence [1,2,3] and network has witnessed significant advances. The IoT deploys sensors in a specific network area to collect real-time information to meet various user needs. When users want to obtain the information captured by drones in a certain area, they send a data request to the servers. The servers find the drones in the corresponding area and ask to upload the captured information, transmit the data through 5G technology to meet user needs. Drones flying in a certain area are susceptible to being captured by attackers and the secret values stored in the memory would be exposed [23,26] These problems make it necessary to design security protocols to ensure normal communication.

Related Work
Limitations
Predeployment Phase
Login and Authentication Phase
Adversary Model
Drone Capture Attacks
Session Key Disclosure Attacks
Drone Impersonation Attacks
The Proposed Protocol
Drone Registration Phase
User Registration Phase
Formal Security Analysis
ROR Proof
ProVerif
Mutual Authentication
Replay Attacks
Privileged Insider Attacks
Drone Capture attacks
Man-in-the-Middle Attacks
User Anonymity and Untraceability
Security and Performance Comparisons
Security Comparisons
Performance Comparison
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.