TY - JOUR
T1 - Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones
AU - Lee, Tian Fu
AU - Lou, Der Chyuan
AU - Chang, Chien Hung
N1 - Publisher Copyright:
© 2023 Elsevier B.V.
PY - 2023/10
Y1 - 2023/10
N2 - Authenticated key agreement for Internet of Drones (IoD) enables mobile users to remotely access a group of drones for secure and efficient services, including the transportation of supplies, the transmission of surveillance data and images, the provision of communication services, etc. Recently, several lightweight authenticated key agreement protocols were developed for IoD to address security problems of previous studies, and showed that the security of their protocols were formally proved and their protocols can resist possible attacks. However, this investigation demonstrates the security weaknesses of a previous protocol, which may lead to their scheme lacking user privacy protection, violating session key security, and unable to withstand impersonation attacks, and develops an enhanced protocol by adopting dynamic identities and ensuring message freshness. The enhanced protocol is proved the security using formal proofs and secure against possible attacks. Compared with related protocols, the enhanced protocol solves the previous weaknesses, provides more security requirements, and increased the overall performance by about 28.4%.
AB - Authenticated key agreement for Internet of Drones (IoD) enables mobile users to remotely access a group of drones for secure and efficient services, including the transportation of supplies, the transmission of surveillance data and images, the provision of communication services, etc. Recently, several lightweight authenticated key agreement protocols were developed for IoD to address security problems of previous studies, and showed that the security of their protocols were formally proved and their protocols can resist possible attacks. However, this investigation demonstrates the security weaknesses of a previous protocol, which may lead to their scheme lacking user privacy protection, violating session key security, and unable to withstand impersonation attacks, and develops an enhanced protocol by adopting dynamic identities and ensuring message freshness. The enhanced protocol is proved the security using formal proofs and secure against possible attacks. Compared with related protocols, the enhanced protocol solves the previous weaknesses, provides more security requirements, and increased the overall performance by about 28.4%.
KW - Authentication
KW - Internet of Drones
KW - Key agreement
KW - Network security
UR - http://www.scopus.com/inward/record.url?scp=85166262417&partnerID=8YFLogxK
U2 - 10.1016/j.iot.2023.100877
DO - 10.1016/j.iot.2023.100877
M3 - 文章
AN - SCOPUS:85166262417
SN - 2542-6605
VL - 23
JO - Internet of Things (Netherlands)
JF - Internet of Things (Netherlands)
M1 - 100877
ER -