The University of Southampton
University of Southampton Institutional Repository

USAF-IoD: ultralightweight and secure authenticated key agreement framework for internet of drones environment

USAF-IoD: ultralightweight and secure authenticated key agreement framework for internet of drones environment
USAF-IoD: ultralightweight and secure authenticated key agreement framework for internet of drones environment
The use of Internet of Drones (IoD) technology has surged across various domains such as logistics, surveying, industrial inspections, emergency response, security, infrastructure monitoring, crop management, and more. However, realtime communication with drones or Unmanned Aerial Vehicles (UAVs) in the IoD environment occurs over an insecure open channel, making it susceptible to various security and privacy vulnerabilities, including unauthorized access, data interception, denial of service attacks, and privacy concerns. Due to their unique characteristics, including long transmission distances, unstable communication environments, resource limitations, and the highly dynamic nature of UAVs, ensuring the security and privacy of IoD systems is of paramount importance for the success of IoD-based applications. Furthermore, drones are resourceconstrained devices, and employing expensive security solutions is impractical, as it would significantly reduce the operational capacity of drones. In this paper, we present the design of an ultralightweight, secure, and robust user-authenticated key agreement framework for the IoD environment, named USAF-IoD. The proposed USAF-IoD is developed by incorporating authenticated encryption (ASCON), cryptographic hashing, XOR operations, and the use of physical unclonable functions (PUFs). PUFs are employed to enhance resistance against physical tampering attacks. The security analysis reveals that the proposed USAF-IoD meets the essential security requirements of the IoD environment. The comparative analysis further highlights the effectiveness of the proposed USAF-IoD, notably excelling in terms of security and functionality characteristics when compared to existing benchmark schemes, and showcasing competitive performance in computation, communication, and energy overheads.
0018-9545
Badshah, Akhtar
f81ea725-6d13-4aa6-b9fb-3822f83778d8
Abbas, Ghulam
2f5e7e3f-b210-4c1f-8fe8-776ee25e5c77
Waqas, Muhammad
28f978b5-2da0-4060-aa7c-d5cadc1a48e1
Tu, Shanshan
ef946f84-9863-4438-a847-0171915b0651
Abbas, Ziaul Haq
ce3900c8-b650-4d76-b047-ddddeaa718ab
Muhammad, Fazal
44ec7037-265b-433c-8de1-c8fdd0b011e9
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80
Badshah, Akhtar
f81ea725-6d13-4aa6-b9fb-3822f83778d8
Abbas, Ghulam
2f5e7e3f-b210-4c1f-8fe8-776ee25e5c77
Waqas, Muhammad
28f978b5-2da0-4060-aa7c-d5cadc1a48e1
Tu, Shanshan
ef946f84-9863-4438-a847-0171915b0651
Abbas, Ziaul Haq
ce3900c8-b650-4d76-b047-ddddeaa718ab
Muhammad, Fazal
44ec7037-265b-433c-8de1-c8fdd0b011e9
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80

Badshah, Akhtar, Abbas, Ghulam, Waqas, Muhammad, Tu, Shanshan, Abbas, Ziaul Haq, Muhammad, Fazal and Chen, Sheng (2024) USAF-IoD: ultralightweight and secure authenticated key agreement framework for internet of drones environment. IEEE Transactions on Vehicular Technology. (In Press)

Record type: Article

Abstract

The use of Internet of Drones (IoD) technology has surged across various domains such as logistics, surveying, industrial inspections, emergency response, security, infrastructure monitoring, crop management, and more. However, realtime communication with drones or Unmanned Aerial Vehicles (UAVs) in the IoD environment occurs over an insecure open channel, making it susceptible to various security and privacy vulnerabilities, including unauthorized access, data interception, denial of service attacks, and privacy concerns. Due to their unique characteristics, including long transmission distances, unstable communication environments, resource limitations, and the highly dynamic nature of UAVs, ensuring the security and privacy of IoD systems is of paramount importance for the success of IoD-based applications. Furthermore, drones are resourceconstrained devices, and employing expensive security solutions is impractical, as it would significantly reduce the operational capacity of drones. In this paper, we present the design of an ultralightweight, secure, and robust user-authenticated key agreement framework for the IoD environment, named USAF-IoD. The proposed USAF-IoD is developed by incorporating authenticated encryption (ASCON), cryptographic hashing, XOR operations, and the use of physical unclonable functions (PUFs). PUFs are employed to enhance resistance against physical tampering attacks. The security analysis reveals that the proposed USAF-IoD meets the essential security requirements of the IoD environment. The comparative analysis further highlights the effectiveness of the proposed USAF-IoD, notably excelling in terms of security and functionality characteristics when compared to existing benchmark schemes, and showcasing competitive performance in computation, communication, and energy overheads.

Text
VT-2023-03971.R1_Proof_hi - Accepted Manuscript
Download (669kB)

More information

Accepted/In Press date: 5 March 2024

Identifiers

Local EPrints ID: 487858
URI: http://eprints.soton.ac.uk/id/eprint/487858
ISSN: 0018-9545
PURE UUID: db7730f8-a4b9-436e-a47b-255138c5034d

Catalogue record

Date deposited: 07 Mar 2024 17:33
Last modified: 10 Apr 2024 04:02

Export record

Contributors

Author: Akhtar Badshah
Author: Ghulam Abbas
Author: Muhammad Waqas
Author: Shanshan Tu
Author: Ziaul Haq Abbas
Author: Fazal Muhammad
Author: Sheng Chen

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×