A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance

Smart cities are made of different interconnected components that exchange data and facilitate the urban living for citizens. Unmanned Aerial Vehicles, known as drones, are components used in various civilian applications, such as agriculture, package delivery, and surveillance. To enhance drone’s f...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of systems architecture 2021-05, Vol.115, p.101955, Article 101955
Hauptverfasser: Nikooghadam, Mahdi, Amintoosi, Haleh, Islam, SK Hafizul, Moghadam, Mostafa Farhadi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Smart cities are made of different interconnected components that exchange data and facilitate the urban living for citizens. Unmanned Aerial Vehicles, known as drones, are components used in various civilian applications, such as agriculture, package delivery, and surveillance. To enhance drone’s flying safety and quality of service, a promising idea is to construct the Internet-of-Drones, where the drones are employed to collect the information, and citizens communicate with the drones of a particular flying zone via their mobile devices to obtain the data in real-time. However, due to the high sensitivity of the information, and the openness of communication media, privacy and security issues should be addressed. Specifically, an efficient and secure authentication scheme is needed to enable users and drones to authenticate each other and share a session key. Due to the drone’s limited resources and energy, the authentication scheme should be efficient regarding the computation overhead while providing high security. In this article, we devise a secure authentication scheme based on elliptic curve for drones to secure smart city surveillance. We demonstrate that our scheme is provably secure in the random oracle model, supporting the security requirements and resisting known attacks while incurring low computation and communication costs. [Display omitted] •We devise an authentication scheme for IoD environments to provide a safe and smart-life for citizens in a smart city.•The proposed protocol is provably secure in the Random Oracle Model.•The security of the proposed protocol is validated formally through the Scyther tool.•The proposed protocol provides resistance against well-known potential security attacks.•The performance analysis showed that proposed protocol is more efficient than other competing protocols.
ISSN:1383-7621
1873-6165
DOI:10.1016/j.sysarc.2020.101955