Abstract

In smart cities, common infrastructures are merged and integrated with various components of information communication and technology (ICT) to be coordinated and controlled. Drones (unmanned aerial vehicles) are amongst those components, and when coordinated with each other and with the environment, the drones form an Internet of Drones (IoD). The IoD provides real-time data to the users in smart cities by utilizing traditional cellular networks. However, the delicate data gathered by drones are subject to many security threats and give rise to numerous privacy and security issues. A robust and secure authentication scheme is required to allow drones and users to authenticate and establish a session key. In this article, we proposed a provably secure symmetric-key and temporal credential-based lightweight authentication protocol (TC-PSLAP) to secure the drone communication. We prove that the proposed scheme is provably secure formally through the automated verification tool AVISPA and Burrows–Abadi–Needham logic (BAN logic). Informal security analysis is also performed to depict that the proposed TC-PSLAP can resist known attacks.

Highlights

  • Over time, more of the rural population is moving to urban areas

  • With the rise of the urban population, it becomes crucial to building smart cities by employing information and communication technologies (ICT) [2, 3]. ese services incorporate smart home, smart meter, smart grid, edge computing, Internet of ings (IoT), and smartphone which enable the individuals to log in into applications and transmit and receive data [4]

  • Srinivas et al [19] introduced an anonymous lightweight authentication scheme for the Internet of Drones (IoD) based on the temporary credentials

Read more

Summary

Introduction

More of the rural population is moving to urban areas. it is right to say that urbanization is the future, and 66% of the society will move to urban areas by 2050 [1]. Srinivas et al [19] introduced an anonymous lightweight authentication scheme for the IoD based on the temporary credentials In their scheme, the user and drone need to be registered with the ground station server (GSS) first to access the remote drone. (1) Communication over the public/open channel is under the full control of A (2) A can forge a message and can delay, restrain, retransmit, and alter the former message (3) By employing the power analysis, A can extract the information from the smart card/mobile device/ drone (4) An outsider or insider/privileged user can compromise the privacy and security of the system (5) An insider says UA can endanger/access the verifier information put in the database controlled by CS [23]

Proposed TC-PSLAP
TC-PSLAP
Findings
Security Analysis
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call