IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication
In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential i...
Gespeichert in:
Veröffentlicht in: | Journal of ambient intelligence and humanized computing 2023-07, Vol.14 (7), p.9529-9542 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 9542 |
---|---|
container_issue | 7 |
container_start_page | 9529 |
container_title | Journal of ambient intelligence and humanized computing |
container_volume | 14 |
creator | Amin, Ruhul Jayaswal, Sakshita Sureshkumar, Venkatasamy Rathore, Balram Jha, Ananya Abdussami, Mohammad |
description | In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works. |
doi_str_mv | 10.1007/s12652-023-04623-8 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2919379309</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2919379309</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EElXpD7CyxLIK-JXEZofKq1IlNrDFcpwJTUntYicS_XtcgmDHLGYszb13rIPQOSWXlJDyKlJW5CwjjGdEFKnLIzShspBZTkV-_Pvm5SmaxbghqbjilNIJel362wiL-fwam6Ffg-tba3qo8TvsMXzatXFvgHfB9976Djc-YNv5oc7AmaoD3LoegoMe-wbXwTvA1m-3gzuktN6doZPGdBFmP3OKXu7vnheP2erpYbm4WWWWcSEzAbywTIgKBGW8KW2T50wKJblQlJaiqoyyRBrKrIK8FAUxNQVaSJb2dV7yKboYc9NPPwaIvd74Ibh0UjNFFS8VJyqp2KiywccYoNG70G5N2GtK9AGlHlHqhFJ_o9QymfhoikmcYIS_6H9cX1cddU8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2919379309</pqid></control><display><type>article</type><title>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</title><source>SpringerLink Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Amin, Ruhul ; Jayaswal, Sakshita ; Sureshkumar, Venkatasamy ; Rathore, Balram ; Jha, Ananya ; Abdussami, Mohammad</creator><creatorcontrib>Amin, Ruhul ; Jayaswal, Sakshita ; Sureshkumar, Venkatasamy ; Rathore, Balram ; Jha, Ananya ; Abdussami, Mohammad</creatorcontrib><description>In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.</description><identifier>ISSN: 1868-5137</identifier><identifier>EISSN: 1868-5145</identifier><identifier>DOI: 10.1007/s12652-023-04623-8</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access control ; Artificial Intelligence ; Authentication ; Communication ; Computational Intelligence ; Data collection ; Drones ; Engineering ; Global positioning systems ; GPS ; Insurance industry ; Internet ; Internet of Things ; Lightweight ; Nuclear power plants ; Original Research ; Protocol ; Robotics and Automation ; Security ; Security systems ; Sensors ; Smart cities ; Surveillance ; User Interfaces and Human Computer Interaction</subject><ispartof>Journal of ambient intelligence and humanized computing, 2023-07, Vol.14 (7), p.9529-9542</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</citedby><cites>FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</cites><orcidid>0000-0002-3592-9421</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12652-023-04623-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2919379309?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Amin, Ruhul</creatorcontrib><creatorcontrib>Jayaswal, Sakshita</creatorcontrib><creatorcontrib>Sureshkumar, Venkatasamy</creatorcontrib><creatorcontrib>Rathore, Balram</creatorcontrib><creatorcontrib>Jha, Ananya</creatorcontrib><creatorcontrib>Abdussami, Mohammad</creatorcontrib><title>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</title><title>Journal of ambient intelligence and humanized computing</title><addtitle>J Ambient Intell Human Comput</addtitle><description>In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.</description><subject>Access control</subject><subject>Artificial Intelligence</subject><subject>Authentication</subject><subject>Communication</subject><subject>Computational Intelligence</subject><subject>Data collection</subject><subject>Drones</subject><subject>Engineering</subject><subject>Global positioning systems</subject><subject>GPS</subject><subject>Insurance industry</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Lightweight</subject><subject>Nuclear power plants</subject><subject>Original Research</subject><subject>Protocol</subject><subject>Robotics and Automation</subject><subject>Security</subject><subject>Security systems</subject><subject>Sensors</subject><subject>Smart cities</subject><subject>Surveillance</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1868-5137</issn><issn>1868-5145</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMtOwzAQRS0EElXpD7CyxLIK-JXEZofKq1IlNrDFcpwJTUntYicS_XtcgmDHLGYszb13rIPQOSWXlJDyKlJW5CwjjGdEFKnLIzShspBZTkV-_Pvm5SmaxbghqbjilNIJel362wiL-fwam6Ffg-tba3qo8TvsMXzatXFvgHfB9976Djc-YNv5oc7AmaoD3LoegoMe-wbXwTvA1m-3gzuktN6doZPGdBFmP3OKXu7vnheP2erpYbm4WWWWcSEzAbywTIgKBGW8KW2T50wKJblQlJaiqoyyRBrKrIK8FAUxNQVaSJb2dV7yKboYc9NPPwaIvd74Ibh0UjNFFS8VJyqp2KiywccYoNG70G5N2GtK9AGlHlHqhFJ_o9QymfhoikmcYIS_6H9cX1cddU8</recordid><startdate>20230701</startdate><enddate>20230701</enddate><creator>Amin, Ruhul</creator><creator>Jayaswal, Sakshita</creator><creator>Sureshkumar, Venkatasamy</creator><creator>Rathore, Balram</creator><creator>Jha, Ananya</creator><creator>Abdussami, Mohammad</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-3592-9421</orcidid></search><sort><creationdate>20230701</creationdate><title>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</title><author>Amin, Ruhul ; Jayaswal, Sakshita ; Sureshkumar, Venkatasamy ; Rathore, Balram ; Jha, Ananya ; Abdussami, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Artificial Intelligence</topic><topic>Authentication</topic><topic>Communication</topic><topic>Computational Intelligence</topic><topic>Data collection</topic><topic>Drones</topic><topic>Engineering</topic><topic>Global positioning systems</topic><topic>GPS</topic><topic>Insurance industry</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Lightweight</topic><topic>Nuclear power plants</topic><topic>Original Research</topic><topic>Protocol</topic><topic>Robotics and Automation</topic><topic>Security</topic><topic>Security systems</topic><topic>Sensors</topic><topic>Smart cities</topic><topic>Surveillance</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Amin, Ruhul</creatorcontrib><creatorcontrib>Jayaswal, Sakshita</creatorcontrib><creatorcontrib>Sureshkumar, Venkatasamy</creatorcontrib><creatorcontrib>Rathore, Balram</creatorcontrib><creatorcontrib>Jha, Ananya</creatorcontrib><creatorcontrib>Abdussami, Mohammad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of ambient intelligence and humanized computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Amin, Ruhul</au><au>Jayaswal, Sakshita</au><au>Sureshkumar, Venkatasamy</au><au>Rathore, Balram</au><au>Jha, Ananya</au><au>Abdussami, Mohammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</atitle><jtitle>Journal of ambient intelligence and humanized computing</jtitle><stitle>J Ambient Intell Human Comput</stitle><date>2023-07-01</date><risdate>2023</risdate><volume>14</volume><issue>7</issue><spage>9529</spage><epage>9542</epage><pages>9529-9542</pages><issn>1868-5137</issn><eissn>1868-5145</eissn><abstract>In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12652-023-04623-8</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-3592-9421</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1868-5137 |
ispartof | Journal of ambient intelligence and humanized computing, 2023-07, Vol.14 (7), p.9529-9542 |
issn | 1868-5137 1868-5145 |
language | eng |
recordid | cdi_proquest_journals_2919379309 |
source | SpringerLink Journals; ProQuest Central UK/Ireland; ProQuest Central |
subjects | Access control Artificial Intelligence Authentication Communication Computational Intelligence Data collection Drones Engineering Global positioning systems GPS Insurance industry Internet Internet of Things Lightweight Nuclear power plants Original Research Protocol Robotics and Automation Security Security systems Sensors Smart cities Surveillance User Interfaces and Human Computer Interaction |
title | IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T05%3A42%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=IoDseC++:%20authenticated%20key%20exchange%20protocol%20for%20cloud-enable%20internet%20of%20drone%20communication&rft.jtitle=Journal%20of%20ambient%20intelligence%20and%20humanized%20computing&rft.au=Amin,%20Ruhul&rft.date=2023-07-01&rft.volume=14&rft.issue=7&rft.spage=9529&rft.epage=9542&rft.pages=9529-9542&rft.issn=1868-5137&rft.eissn=1868-5145&rft_id=info:doi/10.1007/s12652-023-04623-8&rft_dat=%3Cproquest_cross%3E2919379309%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2919379309&rft_id=info:pmid/&rfr_iscdi=true |