{"title":"G2CAIUN: A novel Genus-2 curve-based authentication for secure data transmission in IoT-based UAV networks","authors":"Jatin Sharma, Pawan Singh Mehra","doi":"10.1016/j.phycom.2025.102647","DOIUrl":null,"url":null,"abstract":"<div><div>Unmanned Aerial Vehicles (UAVs) within the Internet of Things (IoT) ecosystem are the networks which are used to collect, process and share data in real-time to support applications like smart agriculture, environment monitoring and disaster management. The communication among UAVs, GCS (Ground Control Station) and External Users (EU) is vulnerable to adversary attacks such as man-in-the-middle, eavesdropping, replay, session key disclosure, impersonation and physical tampering attacks in smart cities scenarios. Most existing studies are based on securing communication between EU and UAV through GCS but do not come across the UAV–UAV and UAV–GCS authentication solutions, which are crucial for UAVs. Therefore, to overcome these problems, this paperwork comes with a lightweight and provable secure mutual authentication scheme which utilises the Hyperelliptic curve (HC) of Genus-2, one-way hash function, XOR operation, random tokens, anonymous identity and timestamps for secure data transmission in EU–GCS–UAV, UAV–GCS and UAV–UAV environment. The proposed scheme is also secured with a lightweight Physical Unclonable Function (PUF) operation to prevent physical capture attacks. The solution provides high security without the intensive computation (2.5 ms) and communication overhead (1456 bits) compared to existing schemes, which rely on bilinear-pairing, quadratic residue theory and elliptic curves of Genus-1. The scheme is formally verified using the Random Oracle Model (ROM) and Scyther under the Dolev–Yao (DY) and Canetti and Krawczyk (CK) adversary models. The informal analysis shows the provable security assessment to make IoT-based UAV networks robust.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"71 ","pages":"Article 102647"},"PeriodicalIF":2.0000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490725000503","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Unmanned Aerial Vehicles (UAVs) within the Internet of Things (IoT) ecosystem are the networks which are used to collect, process and share data in real-time to support applications like smart agriculture, environment monitoring and disaster management. The communication among UAVs, GCS (Ground Control Station) and External Users (EU) is vulnerable to adversary attacks such as man-in-the-middle, eavesdropping, replay, session key disclosure, impersonation and physical tampering attacks in smart cities scenarios. Most existing studies are based on securing communication between EU and UAV through GCS but do not come across the UAV–UAV and UAV–GCS authentication solutions, which are crucial for UAVs. Therefore, to overcome these problems, this paperwork comes with a lightweight and provable secure mutual authentication scheme which utilises the Hyperelliptic curve (HC) of Genus-2, one-way hash function, XOR operation, random tokens, anonymous identity and timestamps for secure data transmission in EU–GCS–UAV, UAV–GCS and UAV–UAV environment. The proposed scheme is also secured with a lightweight Physical Unclonable Function (PUF) operation to prevent physical capture attacks. The solution provides high security without the intensive computation (2.5 ms) and communication overhead (1456 bits) compared to existing schemes, which rely on bilinear-pairing, quadratic residue theory and elliptic curves of Genus-1. The scheme is formally verified using the Random Oracle Model (ROM) and Scyther under the Dolev–Yao (DY) and Canetti and Krawczyk (CK) adversary models. The informal analysis shows the provable security assessment to make IoT-based UAV networks robust.
期刊介绍:
PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published.
Topics of interest include but are not limited to:
Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.