{"title":"Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones","authors":"Dharminder Chaudhary , Cheng-Chi Lee","doi":"10.1016/j.compeleceng.2024.109774","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Drones (IoD) refers to the integration of unmanned aerial vehicles (UAVs) into the broader Internet of Things (IoT) ecosystem. This connection enables a wide range of applications and uses. An authenticated key agreement for the Internet of Drones (IoD) allows mobile device owners to establish a connection with a group of drones remotely for safe and effective services including supply delivery, sending photos and data from surveillance, and other communication services. The exchange of sensitive information through open channel, such as the internet, comes with challenges in terms of data protection and authentication. The invention of Shor’s technique, though, creates complications for authorized and secure communication in the era of highly advanced quantum computers. Therefore, we have proposed a secure authenticated key agreement the Internet of Drones (IoD) based on lattice assumption called ”Ring Learning With Error” on lattices. The RLWE operates on algebraic structures known as polynomial rings, which permits faster and space-efficient cryptographic operations. This efficiency is especially beneficial for limited storage devices (IoD/IoT). This framework is able to withstand quantum attacks, and it is suitable for low computation devices. This protocol provides anonymous communication for both user and drone. Additionally, this protocol ensures user privacy, from breaking session key security, or from withstanding impersonation attacks, and enables mutual authentication, and it utilizes dynamic identities and ensures freshness of messages. The performance analysis indicates that the proposed system performs better than existing state-of-the-art solutions when tested on benchmark datasets using various evaluation metrics.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109774"},"PeriodicalIF":4.0000,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790624007018","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Drones (IoD) refers to the integration of unmanned aerial vehicles (UAVs) into the broader Internet of Things (IoT) ecosystem. This connection enables a wide range of applications and uses. An authenticated key agreement for the Internet of Drones (IoD) allows mobile device owners to establish a connection with a group of drones remotely for safe and effective services including supply delivery, sending photos and data from surveillance, and other communication services. The exchange of sensitive information through open channel, such as the internet, comes with challenges in terms of data protection and authentication. The invention of Shor’s technique, though, creates complications for authorized and secure communication in the era of highly advanced quantum computers. Therefore, we have proposed a secure authenticated key agreement the Internet of Drones (IoD) based on lattice assumption called ”Ring Learning With Error” on lattices. The RLWE operates on algebraic structures known as polynomial rings, which permits faster and space-efficient cryptographic operations. This efficiency is especially beneficial for limited storage devices (IoD/IoT). This framework is able to withstand quantum attacks, and it is suitable for low computation devices. This protocol provides anonymous communication for both user and drone. Additionally, this protocol ensures user privacy, from breaking session key security, or from withstanding impersonation attacks, and enables mutual authentication, and it utilizes dynamic identities and ensures freshness of messages. The performance analysis indicates that the proposed system performs better than existing state-of-the-art solutions when tested on benchmark datasets using various evaluation metrics.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.