Accepted author manuscript, 485 KB, PDF document
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Robust and Lightweight Authentication for Securing Communication in the Internet-of-Drones (IoD) Environment
AU - Ullah Jan, Saeed
AU - Bilal, Muhammad
AU - Ghani, Anwar
AU - Khan, Salabat
AU - Ahmad, Rashid
AU - Kim, Do Hveun
PY - 2024/8/13
Y1 - 2024/8/13
N2 - Being an essential component of 5G and beyond, the Internet of Drones (IoD) enables a legitimate operator to employ several drones to carry out distinct missions in restricted airspace under the control of the GCS. Communication with the external user (mobile operator), the central server, and other drones is accomplished via a public wireless medium, which is vulnerable to numerous threats and needs robust authentication. Various authentication schemes have been presented, some of which have design issues, excessive communication, or lack of a delicate balance of security and performance due to modular exponentiation. Therefore, this article proposes a secure authentication scheme based on asymmetric cryptography to address the issues above. The security of the proposed scheme is formally scrutinized through the RoR model, ProVerif. Furthermore, the performance is analyzed through computation, communication, and storage overheads. The comparative analysis shows that the proposed scheme balances security with performance and can be implemented in a real-world IoD environment.
AB - Being an essential component of 5G and beyond, the Internet of Drones (IoD) enables a legitimate operator to employ several drones to carry out distinct missions in restricted airspace under the control of the GCS. Communication with the external user (mobile operator), the central server, and other drones is accomplished via a public wireless medium, which is vulnerable to numerous threats and needs robust authentication. Various authentication schemes have been presented, some of which have design issues, excessive communication, or lack of a delicate balance of security and performance due to modular exponentiation. Therefore, this article proposes a secure authentication scheme based on asymmetric cryptography to address the issues above. The security of the proposed scheme is formally scrutinized through the RoR model, ProVerif. Furthermore, the performance is analyzed through computation, communication, and storage overheads. The comparative analysis shows that the proposed scheme balances security with performance and can be implemented in a real-world IoD environment.
KW - Authentication
KW - Edge computing networks
KW - IoD
KW - Secure communication
KW - Symmetric cryptography
U2 - 10.1109/INFOCOMWKSHPS61880.2024.10620898
DO - 10.1109/INFOCOMWKSHPS61880.2024.10620898
M3 - Conference contribution/Paper
AN - SCOPUS:85202346220
SN - 9798350384482
T3 - IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
BT - IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
Y2 - 20 May 2024
ER -