Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
Cyber Security and Networks Lab, Innopolis University, Innopolis, Russian Federation.
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
Department of Computer Science and Engineering, Thapar University, Patiala, India.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0003-1902-9877
Show others and affiliations
2019 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 2, p. 3572-3584, article id 8581510Article in journal (Refereed) Published
Abstract [en]

The Internet of Drones (IoD) provides a coordinated access to Unmanned Aerial Vehicles (UAVs) that are referred as drones. The on-going miniaturization of sensors, actuators, and processors with ubiquitous wireless connectivity makes drones to be used in a wide range of applications ranging from military to civilian. Since most of the applications involved in the IoD are real-time based, the users are generally interested in accessing real-time information from drones belonging to a particular fly zone. This happens if we allow users to directly access real-time data from flying drones inside IoD environment and not from the server. This is a serious security breach which may deteriorate performance of any implemented solution in this IoD environment. To address this important issue in IoD, we propose a novel lightweight user authentication scheme in which a user in the IoD environment needs to access data directly from a drone provided that the user is authorized to access the data from that drone. The formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis show that our scheme is secure against several known attacks. The performance comparison demonstrates that our scheme is efficient with respect to various parameters, and it provides better security as compared to those for the related existing schemes. Finally, the practical demonstration of our scheme is done using the widely-accepted NS2 simulation.

Place, publisher, year, edition, pages
IEEE, 2019. Vol. 6, no 2, p. 3572-3584, article id 8581510
Keywords [en]
Internet of Drones, user authentication, AVISPA, NS2 simulation, security
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
URN: urn:nbn:se:ltu:diva-72766DOI: 10.1109/JIOT.2018.2888821ISI: 000467564700192Scopus ID: 2-s2.0-85058878262OAI: oai:DiVA.org:ltu-72766DiVA, id: diva2:1284759
Note

Validerad;2019;Nivå 2;2019-06-18 (johcin)

Available from: 2019-02-01 Created: 2019-02-01 Last updated: 2019-06-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Vasilakos, Athanasios

Search in DiVA

By author/editor
Vasilakos, Athanasios
By organisation
Computer Science
In the same journal
IEEE Internet of Things Journal
Media and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 32 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf