{"title":"基于PUF的无人机互联网高效认证协议","authors":"V. O. Nyangaresi, N. Petrovic","doi":"10.1109/ITC-Egypt52936.2021.9513902","DOIUrl":null,"url":null,"abstract":"Security issues in drone communication include man-in-the-middle attacks, packet replays and forgery. On the other hand, privacy issues include location tracing and lack of user anonymity. Consequently, drone communication security and privacy is critical and as such, numerous schemes have been proposed to address these issues. However, most of the conventional approaches either do not fully address security and privacy issues or result in high communication and computational overheads. In this paper, an efficient authentication protocol is proposed for internet of drones (IoDs) to counter both privacy and security attacks. The simulation results show that this protocol is robust against attacks such as de-synchronization, replays, impersonation, tracing, side channel attacks and offers anonymity, forward and backward key secrecy. It also requires less storage costs and authentication time, while exhibiting average communication and computational overheads.","PeriodicalId":321025,"journal":{"name":"2021 International Telecommunications Conference (ITC-Egypt)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Efficient PUF Based Authentication Protocol for Internet of Drones\",\"authors\":\"V. O. Nyangaresi, N. Petrovic\",\"doi\":\"10.1109/ITC-Egypt52936.2021.9513902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security issues in drone communication include man-in-the-middle attacks, packet replays and forgery. On the other hand, privacy issues include location tracing and lack of user anonymity. Consequently, drone communication security and privacy is critical and as such, numerous schemes have been proposed to address these issues. However, most of the conventional approaches either do not fully address security and privacy issues or result in high communication and computational overheads. In this paper, an efficient authentication protocol is proposed for internet of drones (IoDs) to counter both privacy and security attacks. The simulation results show that this protocol is robust against attacks such as de-synchronization, replays, impersonation, tracing, side channel attacks and offers anonymity, forward and backward key secrecy. It also requires less storage costs and authentication time, while exhibiting average communication and computational overheads.\",\"PeriodicalId\":321025,\"journal\":{\"name\":\"2021 International Telecommunications Conference (ITC-Egypt)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Telecommunications Conference (ITC-Egypt)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITC-Egypt52936.2021.9513902\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Telecommunications Conference (ITC-Egypt)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITC-Egypt52936.2021.9513902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient PUF Based Authentication Protocol for Internet of Drones
Security issues in drone communication include man-in-the-middle attacks, packet replays and forgery. On the other hand, privacy issues include location tracing and lack of user anonymity. Consequently, drone communication security and privacy is critical and as such, numerous schemes have been proposed to address these issues. However, most of the conventional approaches either do not fully address security and privacy issues or result in high communication and computational overheads. In this paper, an efficient authentication protocol is proposed for internet of drones (IoDs) to counter both privacy and security attacks. The simulation results show that this protocol is robust against attacks such as de-synchronization, replays, impersonation, tracing, side channel attacks and offers anonymity, forward and backward key secrecy. It also requires less storage costs and authentication time, while exhibiting average communication and computational overheads.