TY - JOUR
T1 - A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment
AU - Pu, Cong
AU - Wall, Andrew
AU - Choo, Kim Kwang Raymond
AU - Ahmed, Imtiaz
AU - Lim, Sunho
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2022/6/15
Y1 - 2022/6/15
N2 - With accelerated advances in various technologies, drones, better known as unmanned aerial vehicles (UAVs), are increasingly commonplace and consequently have a more pronounced impact on society. For example, Internet of Drones (IoD), a new communication paradigm offering fundamental navigation assistance and access to information, has widespread applications ranging from agricultural drones in farming to surveillance drones in the COVID-19 pandemic. The increasingly prominent role of IoD in our society also reinforces the importance of securing such systems against various data privacy and security threats. Operationally, it can be challenging to adopt conventional off-the-shelf security products in an IoD system due to the underpinning characteristics of drones (e.g., dynamic and open communication channel). Therefore in this article, we propose a lightweight and privacy-preserving mutual authentication and key agreement protocol, hereafter referred to as PMAP. The latter uses a physical unclonable function (PUF) and chaotic system to support mutual authentication and establish a secure session key between communication entities in the IoD system. To be specific, PMAP consists of two schemes, namely: 1) ${\mathrm{ PMAP}}^{D2Z}$ (that mutually authenticates drone and zone service provider (ZSP) and establishes secure session keys) and 2) ${\mathrm{ PMAP}}^{D2D}$ (that mutually authenticates drones and establishes secure session keys). In addition, PMAP supports conditional privacy preserving so that the genuine identity of drones can only be revealed by trusted ZSPs. We evaluate the security of PMAP using automated validation of Internet security protocols and application (AVISPA), as well as provide formal and informal security analysis to show the resilience of PMAP against various security attacks. We also evaluate the performance of PMAP through extensive experiments and compare its performance with existing AKA and IBE-Lite schemes, whose findings show that PMAP achieves better performance in terms of computation cost, energy consumption, and communication overhead.
AB - With accelerated advances in various technologies, drones, better known as unmanned aerial vehicles (UAVs), are increasingly commonplace and consequently have a more pronounced impact on society. For example, Internet of Drones (IoD), a new communication paradigm offering fundamental navigation assistance and access to information, has widespread applications ranging from agricultural drones in farming to surveillance drones in the COVID-19 pandemic. The increasingly prominent role of IoD in our society also reinforces the importance of securing such systems against various data privacy and security threats. Operationally, it can be challenging to adopt conventional off-the-shelf security products in an IoD system due to the underpinning characteristics of drones (e.g., dynamic and open communication channel). Therefore in this article, we propose a lightweight and privacy-preserving mutual authentication and key agreement protocol, hereafter referred to as PMAP. The latter uses a physical unclonable function (PUF) and chaotic system to support mutual authentication and establish a secure session key between communication entities in the IoD system. To be specific, PMAP consists of two schemes, namely: 1) ${\mathrm{ PMAP}}^{D2Z}$ (that mutually authenticates drone and zone service provider (ZSP) and establishes secure session keys) and 2) ${\mathrm{ PMAP}}^{D2D}$ (that mutually authenticates drones and establishes secure session keys). In addition, PMAP supports conditional privacy preserving so that the genuine identity of drones can only be revealed by trusted ZSPs. We evaluate the security of PMAP using automated validation of Internet security protocols and application (AVISPA), as well as provide formal and informal security analysis to show the resilience of PMAP against various security attacks. We also evaluate the performance of PMAP through extensive experiments and compare its performance with existing AKA and IBE-Lite schemes, whose findings show that PMAP achieves better performance in terms of computation cost, energy consumption, and communication overhead.
KW - Authentication and key agreement
KW - Internet of Drones (IoD)
KW - chaotic system
KW - drone
KW - physical unclonable function (PUF)
UR - http://www.scopus.com/inward/record.url?scp=85127502616&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2022.3163367
DO - 10.1109/JIOT.2022.3163367
M3 - Article
AN - SCOPUS:85127502616
SN - 2327-4662
VL - 9
SP - 9918
EP - 9933
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 12
ER -