{"title":"ECC-based Authenticated Key-Agreement Algorithm using Time-stamps for IoD networks","authors":"S. Samanth, P. V., Mamatha Balachandra","doi":"10.1109/DISCOVER55800.2022.9974860","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) networks have advanced and have made the lives of humans much easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory constraints. Both military and civilian applications have used drones or Unmanned Aerial Vehicles (UAVs) over the past several decades. Internet of Drones (IoD) networks are subsets of IoT networks. Drones are resource-constrained devices. Moreover, IoD networks are vulnerable to different security attacks. Hence, 2 RP 3B+ boards are used for the network model to be treated like a drone and a Ground Control Station (GCS) respectively. Moreover, an Authenticated Key-Agreement (AKA) algorithm is designed based on Elliptic Curve Cryptography (ECC). The proposed algorithm has been designed using Python programming language, and the performance metrics analysis is done using Jupyter-Notebook. An idea of integration of timestamps and trigonometric concepts has been introduced to improve the security of the designed ECC-based AKA algorithm. The designed AKA algorithm provides different properties in terms of security, and can also resist some known attacks, as shown by the algorithm’s security analysis. The proposed AKA algorithm’s analysis in terms of performance shows that it outperforms 3 recent related security mechanisms in terms of performance metrics like Total Computation Cost, Total Storage Cost, and Total Communication Cost.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DISCOVER55800.2022.9974860","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of Things (IoT) networks have advanced and have made the lives of humans much easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory constraints. Both military and civilian applications have used drones or Unmanned Aerial Vehicles (UAVs) over the past several decades. Internet of Drones (IoD) networks are subsets of IoT networks. Drones are resource-constrained devices. Moreover, IoD networks are vulnerable to different security attacks. Hence, 2 RP 3B+ boards are used for the network model to be treated like a drone and a Ground Control Station (GCS) respectively. Moreover, an Authenticated Key-Agreement (AKA) algorithm is designed based on Elliptic Curve Cryptography (ECC). The proposed algorithm has been designed using Python programming language, and the performance metrics analysis is done using Jupyter-Notebook. An idea of integration of timestamps and trigonometric concepts has been introduced to improve the security of the designed ECC-based AKA algorithm. The designed AKA algorithm provides different properties in terms of security, and can also resist some known attacks, as shown by the algorithm’s security analysis. The proposed AKA algorithm’s analysis in terms of performance shows that it outperforms 3 recent related security mechanisms in terms of performance metrics like Total Computation Cost, Total Storage Cost, and Total Communication Cost.