Abstract

A drone is an unmanned aerial vehicle, which is deployed in a particular Fly Zone (FZ), and used to collect crucial information from its surrounding environment to be transmitted to the server for further processing. Generally, a Mobile User (MU) is required to access the real-time information collected by the drone stationed in a specific FZ securely. Therefore, to ensure secure and reliable communications an Authenticated Key Exchange (AKE) protocol is imperative to the Internet of Drone (IoD) environment. An AKE scheme ensures only authentic MU to access IoD network resources. Upon successful authentication, MU and drone can set up a secret session key for secure communication in the future. This paper presents a novel Lightweight AKE Protocol for IoD Environment (LAKE-IoD), which first ensures the authenticity of MU and also renders session key establishment mechanism between MU and drone with the help of a server. LAKE-IoD is an AKE protocol, which is based on an authenticated encryption scheme AEGIS, hash function, and bit-wise XOR operation. Meticulous formal security verification by employing a software tool known as Scyther and informal security analysis demonstrates that LAKE-IoD is protected against different well-known active and passive security attacks. Additionally, Burrows-Abadi-Needham logic is applied to verify the logical completeness of LAKE-IoD. Furthermore, a comparison of LAKE-IoD with the related schemes shows that LAKE-IoD incurs less communication, computational and storage overhead.

Highlights

  • Unmanned Aerial Vehicles (UAVs) applications have observed outstanding growth in diverse fields along with the colossal demand of the Internet of Things (IoT)

  • Lin et al [11] present a review on the security and privacy issues in the Internet of Drone (IoD) and discuss various applications of IoD in the generation of communication technology

  • The LAKE-IoD utilizes a Secure Hash Algorithm (SHA-256), an Authenticated Encryption (AE) scheme known as AEGIS, which is Lightweight Cryptographic (LWC) mechanism, and an FE for the bio-metric verification of a user

Read more

Summary

INTRODUCTION

Unmanned Aerial Vehicles (UAVs) applications have observed outstanding growth in diverse fields along with the colossal demand of the Internet of Things (IoT). The cost-effective operational functionalities such as drone monitoring and control, trajectory planning, localization, authorization, and security and privacy are the prime requirements of IoD networks [8]–[10]. An efficient AKE protocol is necessary before utilizing a cryptographic encryption and decryption mechanism to ensure the secure and reliable transmission of information in an IoD network. This paper proposed a novel and lightweight AKE protocol for an IoD environment to ensure secure communication. The proposed scheme utilized a Lightweight Cryptographic (LWC) and Authenticated Encryption (AE) mechanism to ensure the confidentiality and integrity of the exchanged messages during the AKE phase. LAKE-IoD is compared with the related existing AKE schemes in terms of computational, communication, and storage overheads.

RELATED WORK
SECURITY ANALYSIS
FORMAL SECURITY ANALYSIS
STORAGE COST COMPARISON
COMMUNICATION OVERHEAD COMPARISON
COMPUTATIONAL OVERHEAD COMPARISON
VIII. CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.