IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication

In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of ambient intelligence and humanized computing 2023-07, Vol.14 (7), p.9529-9542
Hauptverfasser: Amin, Ruhul, Jayaswal, Sakshita, Sureshkumar, Venkatasamy, Rathore, Balram, Jha, Ananya, Abdussami, Mohammad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 9542
container_issue 7
container_start_page 9529
container_title Journal of ambient intelligence and humanized computing
container_volume 14
creator Amin, Ruhul
Jayaswal, Sakshita
Sureshkumar, Venkatasamy
Rathore, Balram
Jha, Ananya
Abdussami, Mohammad
description In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.
doi_str_mv 10.1007/s12652-023-04623-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2919379309</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2919379309</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EElXpD7CyxLIK-JXEZofKq1IlNrDFcpwJTUntYicS_XtcgmDHLGYszb13rIPQOSWXlJDyKlJW5CwjjGdEFKnLIzShspBZTkV-_Pvm5SmaxbghqbjilNIJel362wiL-fwam6Ffg-tba3qo8TvsMXzatXFvgHfB9976Djc-YNv5oc7AmaoD3LoegoMe-wbXwTvA1m-3gzuktN6doZPGdBFmP3OKXu7vnheP2erpYbm4WWWWcSEzAbywTIgKBGW8KW2T50wKJblQlJaiqoyyRBrKrIK8FAUxNQVaSJb2dV7yKboYc9NPPwaIvd74Ibh0UjNFFS8VJyqp2KiywccYoNG70G5N2GtK9AGlHlHqhFJ_o9QymfhoikmcYIS_6H9cX1cddU8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2919379309</pqid></control><display><type>article</type><title>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</title><source>SpringerLink Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Amin, Ruhul ; Jayaswal, Sakshita ; Sureshkumar, Venkatasamy ; Rathore, Balram ; Jha, Ananya ; Abdussami, Mohammad</creator><creatorcontrib>Amin, Ruhul ; Jayaswal, Sakshita ; Sureshkumar, Venkatasamy ; Rathore, Balram ; Jha, Ananya ; Abdussami, Mohammad</creatorcontrib><description>In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.</description><identifier>ISSN: 1868-5137</identifier><identifier>EISSN: 1868-5145</identifier><identifier>DOI: 10.1007/s12652-023-04623-8</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access control ; Artificial Intelligence ; Authentication ; Communication ; Computational Intelligence ; Data collection ; Drones ; Engineering ; Global positioning systems ; GPS ; Insurance industry ; Internet ; Internet of Things ; Lightweight ; Nuclear power plants ; Original Research ; Protocol ; Robotics and Automation ; Security ; Security systems ; Sensors ; Smart cities ; Surveillance ; User Interfaces and Human Computer Interaction</subject><ispartof>Journal of ambient intelligence and humanized computing, 2023-07, Vol.14 (7), p.9529-9542</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</citedby><cites>FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</cites><orcidid>0000-0002-3592-9421</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12652-023-04623-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2919379309?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Amin, Ruhul</creatorcontrib><creatorcontrib>Jayaswal, Sakshita</creatorcontrib><creatorcontrib>Sureshkumar, Venkatasamy</creatorcontrib><creatorcontrib>Rathore, Balram</creatorcontrib><creatorcontrib>Jha, Ananya</creatorcontrib><creatorcontrib>Abdussami, Mohammad</creatorcontrib><title>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</title><title>Journal of ambient intelligence and humanized computing</title><addtitle>J Ambient Intell Human Comput</addtitle><description>In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.</description><subject>Access control</subject><subject>Artificial Intelligence</subject><subject>Authentication</subject><subject>Communication</subject><subject>Computational Intelligence</subject><subject>Data collection</subject><subject>Drones</subject><subject>Engineering</subject><subject>Global positioning systems</subject><subject>GPS</subject><subject>Insurance industry</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Lightweight</subject><subject>Nuclear power plants</subject><subject>Original Research</subject><subject>Protocol</subject><subject>Robotics and Automation</subject><subject>Security</subject><subject>Security systems</subject><subject>Sensors</subject><subject>Smart cities</subject><subject>Surveillance</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1868-5137</issn><issn>1868-5145</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMtOwzAQRS0EElXpD7CyxLIK-JXEZofKq1IlNrDFcpwJTUntYicS_XtcgmDHLGYszb13rIPQOSWXlJDyKlJW5CwjjGdEFKnLIzShspBZTkV-_Pvm5SmaxbghqbjilNIJel362wiL-fwam6Ffg-tba3qo8TvsMXzatXFvgHfB9976Djc-YNv5oc7AmaoD3LoegoMe-wbXwTvA1m-3gzuktN6doZPGdBFmP3OKXu7vnheP2erpYbm4WWWWcSEzAbywTIgKBGW8KW2T50wKJblQlJaiqoyyRBrKrIK8FAUxNQVaSJb2dV7yKboYc9NPPwaIvd74Ibh0UjNFFS8VJyqp2KiywccYoNG70G5N2GtK9AGlHlHqhFJ_o9QymfhoikmcYIS_6H9cX1cddU8</recordid><startdate>20230701</startdate><enddate>20230701</enddate><creator>Amin, Ruhul</creator><creator>Jayaswal, Sakshita</creator><creator>Sureshkumar, Venkatasamy</creator><creator>Rathore, Balram</creator><creator>Jha, Ananya</creator><creator>Abdussami, Mohammad</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-3592-9421</orcidid></search><sort><creationdate>20230701</creationdate><title>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</title><author>Amin, Ruhul ; Jayaswal, Sakshita ; Sureshkumar, Venkatasamy ; Rathore, Balram ; Jha, Ananya ; Abdussami, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2348-4e36c244be4123f7cf55284983491174bba9c08a12c9e57460ad1e1682491d573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Artificial Intelligence</topic><topic>Authentication</topic><topic>Communication</topic><topic>Computational Intelligence</topic><topic>Data collection</topic><topic>Drones</topic><topic>Engineering</topic><topic>Global positioning systems</topic><topic>GPS</topic><topic>Insurance industry</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Lightweight</topic><topic>Nuclear power plants</topic><topic>Original Research</topic><topic>Protocol</topic><topic>Robotics and Automation</topic><topic>Security</topic><topic>Security systems</topic><topic>Sensors</topic><topic>Smart cities</topic><topic>Surveillance</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Amin, Ruhul</creatorcontrib><creatorcontrib>Jayaswal, Sakshita</creatorcontrib><creatorcontrib>Sureshkumar, Venkatasamy</creatorcontrib><creatorcontrib>Rathore, Balram</creatorcontrib><creatorcontrib>Jha, Ananya</creatorcontrib><creatorcontrib>Abdussami, Mohammad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of ambient intelligence and humanized computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Amin, Ruhul</au><au>Jayaswal, Sakshita</au><au>Sureshkumar, Venkatasamy</au><au>Rathore, Balram</au><au>Jha, Ananya</au><au>Abdussami, Mohammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication</atitle><jtitle>Journal of ambient intelligence and humanized computing</jtitle><stitle>J Ambient Intell Human Comput</stitle><date>2023-07-01</date><risdate>2023</risdate><volume>14</volume><issue>7</issue><spage>9529</spage><epage>9542</epage><pages>9529-9542</pages><issn>1868-5137</issn><eissn>1868-5145</eissn><abstract>In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12652-023-04623-8</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-3592-9421</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1868-5137
ispartof Journal of ambient intelligence and humanized computing, 2023-07, Vol.14 (7), p.9529-9542
issn 1868-5137
1868-5145
language eng
recordid cdi_proquest_journals_2919379309
source SpringerLink Journals; ProQuest Central UK/Ireland; ProQuest Central
subjects Access control
Artificial Intelligence
Authentication
Communication
Computational Intelligence
Data collection
Drones
Engineering
Global positioning systems
GPS
Insurance industry
Internet
Internet of Things
Lightweight
Nuclear power plants
Original Research
Protocol
Robotics and Automation
Security
Security systems
Sensors
Smart cities
Surveillance
User Interfaces and Human Computer Interaction
title IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T05%3A42%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=IoDseC++:%20authenticated%20key%20exchange%20protocol%20for%20cloud-enable%20internet%20of%20drone%20communication&rft.jtitle=Journal%20of%20ambient%20intelligence%20and%20humanized%20computing&rft.au=Amin,%20Ruhul&rft.date=2023-07-01&rft.volume=14&rft.issue=7&rft.spage=9529&rft.epage=9542&rft.pages=9529-9542&rft.issn=1868-5137&rft.eissn=1868-5145&rft_id=info:doi/10.1007/s12652-023-04623-8&rft_dat=%3Cproquest_cross%3E2919379309%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2919379309&rft_id=info:pmid/&rfr_iscdi=true