Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applica...
Saved in:
Published in | IEEE systems journal Vol. 15; no. 3; pp. 4431 - 4438 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.09.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1932-8184 1937-9234 |
DOI | 10.1109/JSYST.2021.3057047 |
Cover
Abstract | The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and military/rescue operations in smart cities. However, this growth in infrastructure smartness is also subject to new security threats and the countermeasures require new customized solutions for IoD. Many schemes to secure IoD environments are proposed recently; however, some of those were proved as insecure and some degrades the efficiency. In this article, using elliptic curve cryptography, we proposed a new authentication scheme to secure the communication between a user and a drone flying in some specific flying zone. The security of the proposed scheme is solicited using formal Random oracle method along with a brief discussion on security aspects provided by proposed scheme. Finally, the comparisons with some related and latest schemes is illustrated. |
---|---|
AbstractList | The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and military/rescue operations in smart cities. However, this growth in infrastructure smartness is also subject to new security threats and the countermeasures require new customized solutions for IoD. Many schemes to secure IoD environments are proposed recently; however, some of those were proved as insecure and some degrades the efficiency. In this article, using elliptic curve cryptography, we proposed a new authentication scheme to secure the communication between a user and a drone flying in some specific flying zone. The security of the proposed scheme is solicited using formal Random oracle method along with a brief discussion on security aspects provided by proposed scheme. Finally, the comparisons with some related and latest schemes is illustrated. |
Author | Kumar, Neeraj Alsharif, Mohammed H. Alomari, Osama Ahmad Chaudhry, Shehzad Ashraf Hussain, Sajid Khan, Muhammad Khurram |
Author_xml | – sequence: 1 givenname: Sajid orcidid: 0000-0003-1540-4940 surname: Hussain fullname: Hussain, Sajid email: sajid.mscs840@iiu.edu.pk organization: Department of Computer Science and Software Engineering, International Islamic University Islamabad, Islamabad, Pakistan – sequence: 2 givenname: Shehzad Ashraf orcidid: 0000-0002-9321-6956 surname: Chaudhry fullname: Chaudhry, Shehzad Ashraf email: ashraf.shehzad.ch@gmail.com organization: Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey – sequence: 3 givenname: Osama Ahmad surname: Alomari fullname: Alomari, Osama Ahmad email: oalomari@gelisim.edu.tr organization: Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey – sequence: 4 givenname: Mohammed H. orcidid: 0000-0001-8579-5444 surname: Alsharif fullname: Alsharif, Mohammed H. email: malsharif@sejong.ac.kr organization: Department of Electrical Engineering, College of Electronics and Information Engineering, Sejong University, Seoul, South Korea – sequence: 5 givenname: Muhammad Khurram orcidid: 0000-0001-6636-0533 surname: Khan fullname: Khan, Muhammad Khurram email: mkhurram@ksu.edu.sa organization: Center of Excellence in Information Assurance, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia – sequence: 6 givenname: Neeraj orcidid: 0000-0002-3020-3947 surname: Kumar fullname: Kumar, Neeraj email: neeraj.kumar@thapar.edu organization: Department of CSED, Thapar Institute of Engineering and Technology, Punjab, India |
BookMark | eNp9kD1PwzAQhi0EEm3hD8BiiTnFn3HMFkKBokogtQxMkUnONFXrFNsd-u9JP8TAwHQn3T333vv20alrHSB0RcmQUqJvX6Yf09mQEUaHnEhFhDpBPaq5SjTj4nTfsySjmThH_RAWhMhMKt1Db_nKhNC4LxzngKdQbXwTt3c4d3hUFMm9CVDjfNMNXWwqE5vW4Wk1hxVg23o8dhG8g4hbix9891O4QGfWLANcHusAvT-OZsVzMnl9Ghf5JKmYljFJP5lgmtRSZjQlsk4lF4QLZSmTVoBVWrFMUgOVsULUTNWq1iaj1oJKucj4AN0c7q59-72BEMtFu_GukyyZTCXjSnbWB4gdtirfhuDBlmvfrIzflpSUu-TKfXLlLrnymFwHZX-gqol769GbZvk_en1AGwD41dI8lYRp_gPK4nwy |
CODEN | ISJEB2 |
CitedBy_id | crossref_primary_10_1109_TII_2022_3158663 crossref_primary_10_1145_3607142 crossref_primary_10_3390_drones6100264 crossref_primary_10_1109_TMC_2023_3284216 crossref_primary_10_1109_ACCESS_2025_3536014 crossref_primary_10_1109_OJCS_2022_3183003 crossref_primary_10_1109_TVT_2023_3306813 crossref_primary_10_1109_ACCESS_2022_3198642 crossref_primary_10_1016_j_compeleceng_2023_108662 crossref_primary_10_1109_ACCESS_2023_3284832 crossref_primary_10_1016_j_tcs_2022_08_019 crossref_primary_10_1109_ACCESS_2021_3124510 crossref_primary_10_1109_ACCESS_2022_3172787 crossref_primary_10_1109_TVT_2023_3292169 crossref_primary_10_3390_math11163450 crossref_primary_10_1109_MCE_2022_3170663 crossref_primary_10_1155_2021_3437373 crossref_primary_10_1016_j_dcan_2024_10_001 crossref_primary_10_3390_math12243965 crossref_primary_10_1007_s11277_024_11639_6 crossref_primary_10_1016_j_sysarc_2022_102737 crossref_primary_10_1109_TCE_2023_3276066 crossref_primary_10_1016_j_prime_2024_100471 crossref_primary_10_1016_j_vehcom_2023_100680 crossref_primary_10_1109_JSYST_2022_3152561 crossref_primary_10_3390_drones6010010 crossref_primary_10_1016_j_eswa_2023_121329 crossref_primary_10_32604_cmc_2024_047625 crossref_primary_10_1016_j_sysarc_2024_103196 crossref_primary_10_1109_JSYST_2022_3162604 crossref_primary_10_3390_s22186902 crossref_primary_10_1109_TNSE_2022_3151843 crossref_primary_10_1016_j_iot_2023_100883 crossref_primary_10_1109_TVT_2024_3380392 crossref_primary_10_1109_ACCESS_2021_3110804 crossref_primary_10_1109_ACCESS_2024_3395494 crossref_primary_10_1002_cpe_7564 crossref_primary_10_1109_TVT_2024_3365992 crossref_primary_10_1109_ACCESS_2021_3076692 crossref_primary_10_1002_cpe_8333 crossref_primary_10_1016_j_comnet_2023_109664 crossref_primary_10_3390_math12050716 crossref_primary_10_1109_ACCESS_2021_3083549 crossref_primary_10_1109_ACCESS_2021_3089009 crossref_primary_10_1016_j_jpdc_2023_104714 crossref_primary_10_1109_ACCESS_2021_3086735 crossref_primary_10_1109_TNSM_2022_3206378 crossref_primary_10_1007_s12083_022_01382_9 crossref_primary_10_1145_3673225 crossref_primary_10_1109_ACCESS_2022_3149376 crossref_primary_10_3390_s23115148 crossref_primary_10_1109_ACCESS_2024_3502754 crossref_primary_10_1016_j_compeleceng_2024_109774 crossref_primary_10_1109_JIOT_2024_3367799 crossref_primary_10_1109_TNSE_2023_3323972 crossref_primary_10_1109_ACCESS_2022_3204793 crossref_primary_10_1109_JIOT_2022_3188711 crossref_primary_10_3390_drones6020041 crossref_primary_10_1109_TVT_2023_3335839 crossref_primary_10_1002_spy2_338 crossref_primary_10_1080_23311916_2022_2029080 crossref_primary_10_1002_spy2_335 crossref_primary_10_1109_JSYST_2022_3189011 crossref_primary_10_32604_cmc_2022_026179 crossref_primary_10_1186_s42400_024_00247_3 crossref_primary_10_2174_0123520965267339230928061410 crossref_primary_10_1177_09287329241291397 crossref_primary_10_1016_j_vehcom_2022_100552 crossref_primary_10_1109_TIFS_2024_3465847 crossref_primary_10_1109_TITS_2024_3428491 |
Cites_doi | 10.1109/COMST.2015.2444095 10.1109/TIFS.2016.2573746 10.1007/978-3-540-75670-5_1 10.1007/978-3-540-30580-4_6 10.1109/ACCESS.2020.3000716 10.1016/j.comcom.2020.02.025 10.1080/09720529.2019.1627072 10.1109/ACCESS.2017.2676119 10.1109/JIOT.2019.2934947 10.1109/ACCESS.2020.2977817 10.1109/TVT.2019.2911672 10.1109/JIOT.2015.2505901 10.1016/j.future.2018.09.058 10.1109/SURV.2013.042313.00197 10.1016/j.ijepes.2020.106529 10.1109/TIFS.2009.2031942 10.1016/j.adhoc.2015.05.014 10.1007/s11277-019-06252-x 10.1109/CCNC.2017.7983104 10.1016/j.adhoc.2014.03.009 10.1109/JIOT.2018.2888821 10.1016/j.jpdc.2017.11.008 10.1016/j.future.2018.04.019 10.1145/3292674 10.1016/j.comcom.2020.02.011 10.1109/TPDS.2010.206 10.1007/s11227-015-1610-x 10.1109/TIT.1983.1056650 10.1109/ACCESS.2017.2684128 10.1109/ACCESS.2016.2537208 10.1109/JIOT.2018.2877690 10.1109/TC.2002.1004593 10.1109/TSG.2017.2720159 10.1016/j.comcom.2020.03.009 10.1109/MCOM.2017.1700390 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/JSYST.2021.3057047 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1937-9234 |
EndPage | 4438 |
ExternalDocumentID | 10_1109_JSYST_2021_3057047 9365029 |
Genre | orig-research |
GrantInformation_xml | – fundername: King Saud University funderid: 10.13039/501100002383 – fundername: Researchers Supporting Project grantid: RSP-2020/12 |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS AAYXX CITATION |
ID | FETCH-LOGICAL-c295t-6b24290d5581605d65340347f125f4ef7972851aecaf44d27d7d9a81ffe763483 |
IEDL.DBID | RIE |
ISSN | 1932-8184 |
IngestDate | Mon Jun 30 10:21:44 EDT 2025 Wed Oct 01 02:25:52 EDT 2025 Thu Apr 24 22:59:31 EDT 2025 Wed Aug 27 02:28:00 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c295t-6b24290d5581605d65340347f125f4ef7972851aecaf44d27d7d9a81ffe763483 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-6636-0533 0000-0002-3020-3947 0000-0001-8579-5444 0000-0003-1540-4940 0000-0002-9321-6956 |
PQID | 2565237592 |
PQPubID | 85494 |
PageCount | 8 |
ParticipantIDs | proquest_journals_2565237592 crossref_citationtrail_10_1109_JSYST_2021_3057047 crossref_primary_10_1109_JSYST_2021_3057047 ieee_primary_9365029 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-Sept. 2021-9-00 20210901 |
PublicationDateYYYYMMDD | 2021-09-01 |
PublicationDate_xml | – month: 09 year: 2021 text: 2021-Sept. |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE systems journal |
PublicationTitleAbbrev | JSYST |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref15 ref36 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 choudhary (ref8) 2018 ref29 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref4 doi: 10.1109/COMST.2015.2444095 – ident: ref34 doi: 10.1109/TIFS.2016.2573746 – ident: ref33 doi: 10.1007/978-3-540-75670-5_1 – ident: ref36 doi: 10.1007/978-3-540-30580-4_6 – ident: ref28 doi: 10.1109/ACCESS.2020.3000716 – ident: ref19 doi: 10.1016/j.comcom.2020.02.025 – ident: ref13 doi: 10.1080/09720529.2019.1627072 – ident: ref17 doi: 10.1109/ACCESS.2017.2676119 – ident: ref21 doi: 10.1109/JIOT.2019.2934947 – ident: ref24 doi: 10.1109/ACCESS.2020.2977817 – ident: ref23 doi: 10.1109/TVT.2019.2911672 – ident: ref2 doi: 10.1109/JIOT.2015.2505901 – ident: ref6 doi: 10.1016/j.future.2018.09.058 – ident: ref5 doi: 10.1109/SURV.2013.042313.00197 – ident: ref30 doi: 10.1016/j.ijepes.2020.106529 – ident: ref10 doi: 10.1109/TIFS.2009.2031942 – ident: ref16 doi: 10.1016/j.adhoc.2015.05.014 – ident: ref15 doi: 10.1007/s11277-019-06252-x – ident: ref3 doi: 10.1109/CCNC.2017.7983104 – ident: ref14 doi: 10.1016/j.adhoc.2014.03.009 – ident: ref25 doi: 10.1109/JIOT.2018.2888821 – ident: ref35 doi: 10.1016/j.jpdc.2017.11.008 – ident: ref18 doi: 10.1016/j.future.2018.04.019 – year: 2018 ident: ref8 article-title: Internet of Drones (IoD): Threats, vulnerability, and security perspectives – ident: ref1 doi: 10.1145/3292674 – ident: ref26 doi: 10.1016/j.comcom.2020.02.011 – ident: ref11 doi: 10.1109/TPDS.2010.206 – ident: ref12 doi: 10.1007/s11227-015-1610-x – ident: ref29 doi: 10.1109/TIT.1983.1056650 – ident: ref22 doi: 10.1109/ACCESS.2017.2684128 – ident: ref9 doi: 10.1109/ACCESS.2016.2537208 – ident: ref20 doi: 10.1109/JIOT.2018.2877690 – ident: ref32 doi: 10.1109/TC.2002.1004593 – ident: ref31 doi: 10.1109/TSG.2017.2720159 – ident: ref27 doi: 10.1016/j.comcom.2020.03.009 – ident: ref7 doi: 10.1109/MCOM.2017.1700390 |
SSID | ssj0058579 |
Score | 2.5384421 |
Snippet | The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 4431 |
SubjectTerms | Authentication Biometrics (access control) Cryptography Curves drone capture attack Drones Elliptic curve cryptography Internet of Drones (IoD) Internet of Things Internet of Things (IoT) security key-agreement provable security Rescue operations Security Security aspects smart city security Surveillance three-factor authentication |
Title | Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones |
URI | https://ieeexplore.ieee.org/document/9365029 https://www.proquest.com/docview/2565237592 |
Volume | 15 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1937-9234 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0058579 issn: 1932-8184 databaseCode: RIE dateStart: 20070101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4IJz34QiO-0oM3LSzdllJviBBiojEBEz1t2m17UcDocvHXO90HMWqMtx7appmZnflmdh4AZ8IKI7ln1DtjKHdeUW0iTr1FW8a1FxELtcO3d93xA795FI9rcLGqhXHO5clnrhWW-b98u0iXIVTWVjHiCaZqUJNSFbValdZF1Jv31Qt4hKIR4lWBTKTaN5OnyRRdQdZpoXTLKIxS-WKE8qkqP1Rxbl9GW3BbvaxIK3luLTPTSj--NW3879O3YbMEmqRfSMYOrLn5Lmx8aT_YgPv-DKEzLgmiQDIpJ9ldkv6cDAcDeoUGzpIQQwsZRUVoj0yQyTNHEOqSIpjoMrLw5Pot9Pzfg4fRcDoY03LCAk2ZEhntGrTQKrJC9Dro19iuiHkUc-kR9nhknFSSISTTLtWec8uklVbpXsd7h3qJ9-J9qM_x_gMgMk3TnnZOG6a4k1ZzK-LImhhdulhp3oRORfIkLduPhykYL0nuhkQqydmUBDYlJZuacL4681o03_hzdyPQfbWzJHkTjivOJuX3-Z4g0EMPXArFDn8_dQTr4e4im-wY6tnb0p0g_MjMaS53nyBB1U0 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGICBN6I8PbCBS-rYdc1WCqg8ipBaJJgiO7YXaEGQLvx6znlUCBBi82An1t3l7rvLPQAOhBVGcs-od8ZQ7ryi2kSceou2jGsvIhZqh3u3ze49v3oQD1NwNKmFcc7lyWeuHpb5v3z7ko5DqOxYxYgnmJqGWYFehSyqtSq9i7g376wXEAlFM8SrEplIHV_1H_sDdAZZo47yLaMwTOWLGcrnqvxQxrmFuViCXnW3IrHkqT7OTD39-Na28b-XX4bFEmqSdiEbKzDlRquw8KUB4RrctYcInnFJEAeSfjnL7oS0R-S806GnaOIsCVG0kFNUBPdIH9k8dATBLinCiS4jL56cvYWu_-twf3E-6HRpOWOBpkyJjDYN2mgVWSFaDfRsbFPEPIq59Ah8PLJOKskQlGmXas-5ZdJKq3Sr4b1DzcRb8QbMjPD5m0BkmqYt7Zw2THEnreZWxJE1MTp1sdK8Bo2K5ElaNiAPczCek9wRiVSSsykJbEpKNtXgcHLmtWi_8efutUD3yc6S5DXYqTiblF_oe4JQD31wKRTb-v3UPsx1B72b5Oby9nob5sN7ityyHZjJ3sZuF8FIZvZyGfwEgirYng |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Amassing+the+Security%3A+An+ECC-Based+Authentication+Scheme+for+Internet+of+Drones&rft.jtitle=IEEE+systems+journal&rft.au=Hussain%2C+Sajid&rft.au=Chaudhry%2C+Shehzad+Ashraf&rft.au=Alomari%2C+Osama+Ahmad&rft.au=Alsharif%2C+Mohammed+H.&rft.date=2021-09-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=15&rft.issue=3&rft.spage=4431&rft.epage=4438&rft_id=info:doi/10.1109%2FJSYST.2021.3057047&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSYST_2021_3057047 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon |