Home > Research > Publications & Outputs > Robust and Lightweight Authentication for Secur...

Electronic data

  • Robust_and_Lightweight_Authentication_for_Securing_Communication_in_the_Internet-of-Drones_IoD_Environment

    Accepted author manuscript, 485 KB, PDF document

Links

Text available via DOI:

View graph of relations

Robust and Lightweight Authentication for Securing Communication in the Internet-of-Drones (IoD) Environment

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
  • Saeed Ullah Jan
  • Muhammad Bilal
  • Anwar Ghani
  • Salabat Khan
  • Rashid Ahmad
  • Do Hveun Kim
Close
Publication date13/08/2024
Host publicationIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (electronic)9798350384475
ISBN (print)9798350384482
<mark>Original language</mark>English
Event2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 - Vancouver, Canada
Duration: 20/05/2024 → …

Conference

Conference2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
Country/TerritoryCanada
CityVancouver
Period20/05/24 → …

Publication series

NameIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024

Conference

Conference2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
Country/TerritoryCanada
CityVancouver
Period20/05/24 → …

Abstract

Being an essential component of 5G and beyond, the Internet of Drones (IoD) enables a legitimate operator to employ several drones to carry out distinct missions in restricted airspace under the control of the GCS. Communication with the external user (mobile operator), the central server, and other drones is accomplished via a public wireless medium, which is vulnerable to numerous threats and needs robust authentication. Various authentication schemes have been presented, some of which have design issues, excessive communication, or lack of a delicate balance of security and performance due to modular exponentiation. Therefore, this article proposes a secure authentication scheme based on asymmetric cryptography to address the issues above. The security of the proposed scheme is formally scrutinized through the RoR model, ProVerif. Furthermore, the performance is analyzed through computation, communication, and storage overheads. The comparative analysis shows that the proposed scheme balances security with performance and can be implemented in a real-world IoD environment.