咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Mutual Authentication and Cr... 收藏

A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD)

作     者:Saeed Ullah Jan Irshad Ahmed Abbasi Fahad Algarni 

作者机构:Department of Computer Science&ITUniversity of MalakandChakadara18800Pakistan Faculty of Science&Arts BelqarnDepartment of Computer ScienceUniversity of BishaSabtul Alaya 61985Saudi Arabia Faculty of Computing and Information TechnologyUniversity of BishaBisha 67714Saudi Arabia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2022年第72卷第9期

页      面:5845-5869页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:University of Bisha 

主  题:Cryptography authentication confidentiality reachability ZSP 

摘      要:With the rapid miniaturization in sensor technology,Internet-ofDrones(IoD)has delighted researchers towards information transmission security among drones with the control station server(CSS).In IoD,the drone is different in shapes,sizes,characteristics,and configurations.It can be classified on the purpose of its deployment,either in the civilian or military domain.Drone’s manufacturing,equipment installation,power supply,multi-rotor system,and embedded sensors are not issues for researchers.The main thing is to utilize a drone for a complex and sensitive task using an infrastructureless/self-organization/resource-less network type called Flying Ad Hoc Network(FANET).Monitoring data transmission traffic,emergency and rescue operations,border surveillance,search and physical phenomenon sensing,and so on can be achieved by developing a robust mutual authentication and cross-verification scheme for IoD deployment civilian drones.Although several protocols are available in the literature,they are either design issues or suffering from other vulnerabilities;still,no one claims with conviction about foolproof security mechanisms.Therefore,in this paper,the researchers highlighted the major deficits in prior protocols of the domain,i.e.,these protocols are either vulnerable to forgery,side channel,stolen-verifier attacks,or raised the outdated data transmission flaw.In order to overcome these loopholes and provide a solution to the existing vulnerabilities,this paper proposed an improved and robust public key infrastructure(PKI)based authentication scheme for the IoD environment.The proposed protocol’s security analysis section has been conducted formally using BAN(Burrows-Abadi-Needham)logic,ProVerif2.03 simulation,and informally using discussion/pragmatic illustration.While the performance analysis section of the paper has been assessed by considering storage,computation,and communication cost.Upon comparing the proposed protocol with prior works,it has been demonstrated that it is efficient and effective and recommended for practical implementation in the IoD environment.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分