{"title":"无人机互联网安全轻量级身份认证与密钥协议方案","authors":"Wenlong Dong, Xiujun Wang, Juyan Li","doi":"10.1016/j.comnet.2025.111503","DOIUrl":null,"url":null,"abstract":"<div><div>With the widespread application of drone technology in production and daily life, real-time remote data acquisition has become a common requirement. To secure data transmission, it is essential to implement authentication and key management between the drone and the user. To this end, we propose a lightweight authentication protocol that utilizes XOR operations and hash functions exclusively, which is particularly suitable for use between drone devices and users with limited resources. Using BAN logic analysis, we validate the protocol’s effectiveness. Additionally, we prove the security of the key management through the Real-Or-Random (ROR) model. Security analysis demonstrates that our scheme can resist multiple known attacks. Security analysis shows that our scheme can withstand multiple known attacks. Experimental results show that our scheme is more efficient than existing ones in computational cost, communication overhead, and energy consumption.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111503"},"PeriodicalIF":4.6000,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A secure lightweight identity authentication and key agreement scheme for internet of drones\",\"authors\":\"Wenlong Dong, Xiujun Wang, Juyan Li\",\"doi\":\"10.1016/j.comnet.2025.111503\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the widespread application of drone technology in production and daily life, real-time remote data acquisition has become a common requirement. To secure data transmission, it is essential to implement authentication and key management between the drone and the user. To this end, we propose a lightweight authentication protocol that utilizes XOR operations and hash functions exclusively, which is particularly suitable for use between drone devices and users with limited resources. Using BAN logic analysis, we validate the protocol’s effectiveness. Additionally, we prove the security of the key management through the Real-Or-Random (ROR) model. Security analysis demonstrates that our scheme can resist multiple known attacks. Security analysis shows that our scheme can withstand multiple known attacks. Experimental results show that our scheme is more efficient than existing ones in computational cost, communication overhead, and energy consumption.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"270 \",\"pages\":\"Article 111503\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004700\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004700","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
A secure lightweight identity authentication and key agreement scheme for internet of drones
With the widespread application of drone technology in production and daily life, real-time remote data acquisition has become a common requirement. To secure data transmission, it is essential to implement authentication and key management between the drone and the user. To this end, we propose a lightweight authentication protocol that utilizes XOR operations and hash functions exclusively, which is particularly suitable for use between drone devices and users with limited resources. Using BAN logic analysis, we validate the protocol’s effectiveness. Additionally, we prove the security of the key management through the Real-Or-Random (ROR) model. Security analysis demonstrates that our scheme can resist multiple known attacks. Security analysis shows that our scheme can withstand multiple known attacks. Experimental results show that our scheme is more efficient than existing ones in computational cost, communication overhead, and energy consumption.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.