Accepted author manuscript, 485 KB, PDF document
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Publication date | 13/08/2024 |
---|---|
Host publication | IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN (electronic) | 9798350384475 |
ISBN (print) | 9798350384482 |
<mark>Original language</mark> | English |
Event | 2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 - Vancouver, Canada Duration: 20/05/2024 → … |
Conference | 2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 |
---|---|
Country/Territory | Canada |
City | Vancouver |
Period | 20/05/24 → … |
Name | IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 |
---|
Conference | 2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 |
---|---|
Country/Territory | Canada |
City | Vancouver |
Period | 20/05/24 → … |
Being an essential component of 5G and beyond, the Internet of Drones (IoD) enables a legitimate operator to employ several drones to carry out distinct missions in restricted airspace under the control of the GCS. Communication with the external user (mobile operator), the central server, and other drones is accomplished via a public wireless medium, which is vulnerable to numerous threats and needs robust authentication. Various authentication schemes have been presented, some of which have design issues, excessive communication, or lack of a delicate balance of security and performance due to modular exponentiation. Therefore, this article proposes a secure authentication scheme based on asymmetric cryptography to address the issues above. The security of the proposed scheme is formally scrutinized through the RoR model, ProVerif. Furthermore, the performance is analyzed through computation, communication, and storage overheads. The comparative analysis shows that the proposed scheme balances security with performance and can be implemented in a real-world IoD environment.