Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applica...

Full description

Saved in:
Bibliographic Details
Published inIEEE systems journal Vol. 15; no. 3; pp. 4431 - 4438
Main Authors Hussain, Sajid, Chaudhry, Shehzad Ashraf, Alomari, Osama Ahmad, Alsharif, Mohammed H., Khan, Muhammad Khurram, Kumar, Neeraj
Format Journal Article
LanguageEnglish
Published New York IEEE 01.09.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1932-8184
1937-9234
DOI10.1109/JSYST.2021.3057047

Cover

Abstract The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and military/rescue operations in smart cities. However, this growth in infrastructure smartness is also subject to new security threats and the countermeasures require new customized solutions for IoD. Many schemes to secure IoD environments are proposed recently; however, some of those were proved as insecure and some degrades the efficiency. In this article, using elliptic curve cryptography, we proposed a new authentication scheme to secure the communication between a user and a drone flying in some specific flying zone. The security of the proposed scheme is solicited using formal Random oracle method along with a brief discussion on security aspects provided by proposed scheme. Finally, the comparisons with some related and latest schemes is illustrated.
AbstractList The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and military/rescue operations in smart cities. However, this growth in infrastructure smartness is also subject to new security threats and the countermeasures require new customized solutions for IoD. Many schemes to secure IoD environments are proposed recently; however, some of those were proved as insecure and some degrades the efficiency. In this article, using elliptic curve cryptography, we proposed a new authentication scheme to secure the communication between a user and a drone flying in some specific flying zone. The security of the proposed scheme is solicited using formal Random oracle method along with a brief discussion on security aspects provided by proposed scheme. Finally, the comparisons with some related and latest schemes is illustrated.
Author Kumar, Neeraj
Alsharif, Mohammed H.
Alomari, Osama Ahmad
Chaudhry, Shehzad Ashraf
Hussain, Sajid
Khan, Muhammad Khurram
Author_xml – sequence: 1
  givenname: Sajid
  orcidid: 0000-0003-1540-4940
  surname: Hussain
  fullname: Hussain, Sajid
  email: sajid.mscs840@iiu.edu.pk
  organization: Department of Computer Science and Software Engineering, International Islamic University Islamabad, Islamabad, Pakistan
– sequence: 2
  givenname: Shehzad Ashraf
  orcidid: 0000-0002-9321-6956
  surname: Chaudhry
  fullname: Chaudhry, Shehzad Ashraf
  email: ashraf.shehzad.ch@gmail.com
  organization: Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey
– sequence: 3
  givenname: Osama Ahmad
  surname: Alomari
  fullname: Alomari, Osama Ahmad
  email: oalomari@gelisim.edu.tr
  organization: Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey
– sequence: 4
  givenname: Mohammed H.
  orcidid: 0000-0001-8579-5444
  surname: Alsharif
  fullname: Alsharif, Mohammed H.
  email: malsharif@sejong.ac.kr
  organization: Department of Electrical Engineering, College of Electronics and Information Engineering, Sejong University, Seoul, South Korea
– sequence: 5
  givenname: Muhammad Khurram
  orcidid: 0000-0001-6636-0533
  surname: Khan
  fullname: Khan, Muhammad Khurram
  email: mkhurram@ksu.edu.sa
  organization: Center of Excellence in Information Assurance, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia
– sequence: 6
  givenname: Neeraj
  orcidid: 0000-0002-3020-3947
  surname: Kumar
  fullname: Kumar, Neeraj
  email: neeraj.kumar@thapar.edu
  organization: Department of CSED, Thapar Institute of Engineering and Technology, Punjab, India
BookMark eNp9kD1PwzAQhi0EEm3hD8BiiTnFn3HMFkKBokogtQxMkUnONFXrFNsd-u9JP8TAwHQn3T333vv20alrHSB0RcmQUqJvX6Yf09mQEUaHnEhFhDpBPaq5SjTj4nTfsySjmThH_RAWhMhMKt1Db_nKhNC4LxzngKdQbXwTt3c4d3hUFMm9CVDjfNMNXWwqE5vW4Wk1hxVg23o8dhG8g4hbix9891O4QGfWLANcHusAvT-OZsVzMnl9Ghf5JKmYljFJP5lgmtRSZjQlsk4lF4QLZSmTVoBVWrFMUgOVsULUTNWq1iaj1oJKucj4AN0c7q59-72BEMtFu_GukyyZTCXjSnbWB4gdtirfhuDBlmvfrIzflpSUu-TKfXLlLrnymFwHZX-gqol769GbZvk_en1AGwD41dI8lYRp_gPK4nwy
CODEN ISJEB2
CitedBy_id crossref_primary_10_1109_TII_2022_3158663
crossref_primary_10_1145_3607142
crossref_primary_10_3390_drones6100264
crossref_primary_10_1109_TMC_2023_3284216
crossref_primary_10_1109_ACCESS_2025_3536014
crossref_primary_10_1109_OJCS_2022_3183003
crossref_primary_10_1109_TVT_2023_3306813
crossref_primary_10_1109_ACCESS_2022_3198642
crossref_primary_10_1016_j_compeleceng_2023_108662
crossref_primary_10_1109_ACCESS_2023_3284832
crossref_primary_10_1016_j_tcs_2022_08_019
crossref_primary_10_1109_ACCESS_2021_3124510
crossref_primary_10_1109_ACCESS_2022_3172787
crossref_primary_10_1109_TVT_2023_3292169
crossref_primary_10_3390_math11163450
crossref_primary_10_1109_MCE_2022_3170663
crossref_primary_10_1155_2021_3437373
crossref_primary_10_1016_j_dcan_2024_10_001
crossref_primary_10_3390_math12243965
crossref_primary_10_1007_s11277_024_11639_6
crossref_primary_10_1016_j_sysarc_2022_102737
crossref_primary_10_1109_TCE_2023_3276066
crossref_primary_10_1016_j_prime_2024_100471
crossref_primary_10_1016_j_vehcom_2023_100680
crossref_primary_10_1109_JSYST_2022_3152561
crossref_primary_10_3390_drones6010010
crossref_primary_10_1016_j_eswa_2023_121329
crossref_primary_10_32604_cmc_2024_047625
crossref_primary_10_1016_j_sysarc_2024_103196
crossref_primary_10_1109_JSYST_2022_3162604
crossref_primary_10_3390_s22186902
crossref_primary_10_1109_TNSE_2022_3151843
crossref_primary_10_1016_j_iot_2023_100883
crossref_primary_10_1109_TVT_2024_3380392
crossref_primary_10_1109_ACCESS_2021_3110804
crossref_primary_10_1109_ACCESS_2024_3395494
crossref_primary_10_1002_cpe_7564
crossref_primary_10_1109_TVT_2024_3365992
crossref_primary_10_1109_ACCESS_2021_3076692
crossref_primary_10_1002_cpe_8333
crossref_primary_10_1016_j_comnet_2023_109664
crossref_primary_10_3390_math12050716
crossref_primary_10_1109_ACCESS_2021_3083549
crossref_primary_10_1109_ACCESS_2021_3089009
crossref_primary_10_1016_j_jpdc_2023_104714
crossref_primary_10_1109_ACCESS_2021_3086735
crossref_primary_10_1109_TNSM_2022_3206378
crossref_primary_10_1007_s12083_022_01382_9
crossref_primary_10_1145_3673225
crossref_primary_10_1109_ACCESS_2022_3149376
crossref_primary_10_3390_s23115148
crossref_primary_10_1109_ACCESS_2024_3502754
crossref_primary_10_1016_j_compeleceng_2024_109774
crossref_primary_10_1109_JIOT_2024_3367799
crossref_primary_10_1109_TNSE_2023_3323972
crossref_primary_10_1109_ACCESS_2022_3204793
crossref_primary_10_1109_JIOT_2022_3188711
crossref_primary_10_3390_drones6020041
crossref_primary_10_1109_TVT_2023_3335839
crossref_primary_10_1002_spy2_338
crossref_primary_10_1080_23311916_2022_2029080
crossref_primary_10_1002_spy2_335
crossref_primary_10_1109_JSYST_2022_3189011
crossref_primary_10_32604_cmc_2022_026179
crossref_primary_10_1186_s42400_024_00247_3
crossref_primary_10_2174_0123520965267339230928061410
crossref_primary_10_1177_09287329241291397
crossref_primary_10_1016_j_vehcom_2022_100552
crossref_primary_10_1109_TIFS_2024_3465847
crossref_primary_10_1109_TITS_2024_3428491
Cites_doi 10.1109/COMST.2015.2444095
10.1109/TIFS.2016.2573746
10.1007/978-3-540-75670-5_1
10.1007/978-3-540-30580-4_6
10.1109/ACCESS.2020.3000716
10.1016/j.comcom.2020.02.025
10.1080/09720529.2019.1627072
10.1109/ACCESS.2017.2676119
10.1109/JIOT.2019.2934947
10.1109/ACCESS.2020.2977817
10.1109/TVT.2019.2911672
10.1109/JIOT.2015.2505901
10.1016/j.future.2018.09.058
10.1109/SURV.2013.042313.00197
10.1016/j.ijepes.2020.106529
10.1109/TIFS.2009.2031942
10.1016/j.adhoc.2015.05.014
10.1007/s11277-019-06252-x
10.1109/CCNC.2017.7983104
10.1016/j.adhoc.2014.03.009
10.1109/JIOT.2018.2888821
10.1016/j.jpdc.2017.11.008
10.1016/j.future.2018.04.019
10.1145/3292674
10.1016/j.comcom.2020.02.011
10.1109/TPDS.2010.206
10.1007/s11227-015-1610-x
10.1109/TIT.1983.1056650
10.1109/ACCESS.2017.2684128
10.1109/ACCESS.2016.2537208
10.1109/JIOT.2018.2877690
10.1109/TC.2002.1004593
10.1109/TSG.2017.2720159
10.1016/j.comcom.2020.03.009
10.1109/MCOM.2017.1700390
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/JSYST.2021.3057047
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-9234
EndPage 4438
ExternalDocumentID 10_1109_JSYST_2021_3057047
9365029
Genre orig-research
GrantInformation_xml – fundername: King Saud University
  funderid: 10.13039/501100002383
– fundername: Researchers Supporting Project
  grantid: RSP-2020/12
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
AAYXX
CITATION
ID FETCH-LOGICAL-c295t-6b24290d5581605d65340347f125f4ef7972851aecaf44d27d7d9a81ffe763483
IEDL.DBID RIE
ISSN 1932-8184
IngestDate Mon Jun 30 10:21:44 EDT 2025
Wed Oct 01 02:25:52 EDT 2025
Thu Apr 24 22:59:31 EDT 2025
Wed Aug 27 02:28:00 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-6b24290d5581605d65340347f125f4ef7972851aecaf44d27d7d9a81ffe763483
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6636-0533
0000-0002-3020-3947
0000-0001-8579-5444
0000-0003-1540-4940
0000-0002-9321-6956
PQID 2565237592
PQPubID 85494
PageCount 8
ParticipantIDs proquest_journals_2565237592
crossref_citationtrail_10_1109_JSYST_2021_3057047
crossref_primary_10_1109_JSYST_2021_3057047
ieee_primary_9365029
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-Sept.
2021-9-00
20210901
PublicationDateYYYYMMDD 2021-09-01
PublicationDate_xml – month: 09
  year: 2021
  text: 2021-Sept.
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE systems journal
PublicationTitleAbbrev JSYST
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref15
ref36
ref14
ref31
ref30
ref33
ref11
ref32
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
choudhary (ref8) 2018
ref29
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref4
  doi: 10.1109/COMST.2015.2444095
– ident: ref34
  doi: 10.1109/TIFS.2016.2573746
– ident: ref33
  doi: 10.1007/978-3-540-75670-5_1
– ident: ref36
  doi: 10.1007/978-3-540-30580-4_6
– ident: ref28
  doi: 10.1109/ACCESS.2020.3000716
– ident: ref19
  doi: 10.1016/j.comcom.2020.02.025
– ident: ref13
  doi: 10.1080/09720529.2019.1627072
– ident: ref17
  doi: 10.1109/ACCESS.2017.2676119
– ident: ref21
  doi: 10.1109/JIOT.2019.2934947
– ident: ref24
  doi: 10.1109/ACCESS.2020.2977817
– ident: ref23
  doi: 10.1109/TVT.2019.2911672
– ident: ref2
  doi: 10.1109/JIOT.2015.2505901
– ident: ref6
  doi: 10.1016/j.future.2018.09.058
– ident: ref5
  doi: 10.1109/SURV.2013.042313.00197
– ident: ref30
  doi: 10.1016/j.ijepes.2020.106529
– ident: ref10
  doi: 10.1109/TIFS.2009.2031942
– ident: ref16
  doi: 10.1016/j.adhoc.2015.05.014
– ident: ref15
  doi: 10.1007/s11277-019-06252-x
– ident: ref3
  doi: 10.1109/CCNC.2017.7983104
– ident: ref14
  doi: 10.1016/j.adhoc.2014.03.009
– ident: ref25
  doi: 10.1109/JIOT.2018.2888821
– ident: ref35
  doi: 10.1016/j.jpdc.2017.11.008
– ident: ref18
  doi: 10.1016/j.future.2018.04.019
– year: 2018
  ident: ref8
  article-title: Internet of Drones (IoD): Threats, vulnerability, and security perspectives
– ident: ref1
  doi: 10.1145/3292674
– ident: ref26
  doi: 10.1016/j.comcom.2020.02.011
– ident: ref11
  doi: 10.1109/TPDS.2010.206
– ident: ref12
  doi: 10.1007/s11227-015-1610-x
– ident: ref29
  doi: 10.1109/TIT.1983.1056650
– ident: ref22
  doi: 10.1109/ACCESS.2017.2684128
– ident: ref9
  doi: 10.1109/ACCESS.2016.2537208
– ident: ref20
  doi: 10.1109/JIOT.2018.2877690
– ident: ref32
  doi: 10.1109/TC.2002.1004593
– ident: ref31
  doi: 10.1109/TSG.2017.2720159
– ident: ref27
  doi: 10.1016/j.comcom.2020.03.009
– ident: ref7
  doi: 10.1109/MCOM.2017.1700390
SSID ssj0058579
Score 2.5384421
Snippet The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4431
SubjectTerms Authentication
Biometrics (access control)
Cryptography
Curves
drone capture attack
Drones
Elliptic curve cryptography
Internet of Drones (IoD)
Internet of Things
Internet of Things (IoT) security
key-agreement
provable security
Rescue operations
Security
Security aspects
smart city security
Surveillance
three-factor authentication
Title Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
URI https://ieeexplore.ieee.org/document/9365029
https://www.proquest.com/docview/2565237592
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1937-9234
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0058579
  issn: 1932-8184
  databaseCode: RIE
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4IJz34QiO-0oM3LSzdllJviBBiojEBEz1t2m17UcDocvHXO90HMWqMtx7appmZnflmdh4AZ8IKI7ln1DtjKHdeUW0iTr1FW8a1FxELtcO3d93xA795FI9rcLGqhXHO5clnrhWW-b98u0iXIVTWVjHiCaZqUJNSFbValdZF1Jv31Qt4hKIR4lWBTKTaN5OnyRRdQdZpoXTLKIxS-WKE8qkqP1Rxbl9GW3BbvaxIK3luLTPTSj--NW3879O3YbMEmqRfSMYOrLn5Lmx8aT_YgPv-DKEzLgmiQDIpJ9ldkv6cDAcDeoUGzpIQQwsZRUVoj0yQyTNHEOqSIpjoMrLw5Pot9Pzfg4fRcDoY03LCAk2ZEhntGrTQKrJC9Dro19iuiHkUc-kR9nhknFSSISTTLtWec8uklVbpXsd7h3qJ9-J9qM_x_gMgMk3TnnZOG6a4k1ZzK-LImhhdulhp3oRORfIkLduPhykYL0nuhkQqydmUBDYlJZuacL4681o03_hzdyPQfbWzJHkTjivOJuX3-Z4g0EMPXArFDn8_dQTr4e4im-wY6tnb0p0g_MjMaS53nyBB1U0
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGICBN6I8PbCBS-rYdc1WCqg8ipBaJJgiO7YXaEGQLvx6znlUCBBi82An1t3l7rvLPQAOhBVGcs-od8ZQ7ryi2kSceou2jGsvIhZqh3u3ze49v3oQD1NwNKmFcc7lyWeuHpb5v3z7ko5DqOxYxYgnmJqGWYFehSyqtSq9i7g376wXEAlFM8SrEplIHV_1H_sDdAZZo47yLaMwTOWLGcrnqvxQxrmFuViCXnW3IrHkqT7OTD39-Na28b-XX4bFEmqSdiEbKzDlRquw8KUB4RrctYcInnFJEAeSfjnL7oS0R-S806GnaOIsCVG0kFNUBPdIH9k8dATBLinCiS4jL56cvYWu_-twf3E-6HRpOWOBpkyJjDYN2mgVWSFaDfRsbFPEPIq59Ah8PLJOKskQlGmXas-5ZdJKq3Sr4b1DzcRb8QbMjPD5m0BkmqYt7Zw2THEnreZWxJE1MTp1sdK8Bo2K5ElaNiAPczCek9wRiVSSsykJbEpKNtXgcHLmtWi_8efutUD3yc6S5DXYqTiblF_oe4JQD31wKRTb-v3UPsx1B72b5Oby9nob5sN7ityyHZjJ3sZuF8FIZvZyGfwEgirYng
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Amassing+the+Security%3A+An+ECC-Based+Authentication+Scheme+for+Internet+of+Drones&rft.jtitle=IEEE+systems+journal&rft.au=Hussain%2C+Sajid&rft.au=Chaudhry%2C+Shehzad+Ashraf&rft.au=Alomari%2C+Osama+Ahmad&rft.au=Alsharif%2C+Mohammed+H.&rft.date=2021-09-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=15&rft.issue=3&rft.spage=4431&rft.epage=4438&rft_id=info:doi/10.1109%2FJSYST.2021.3057047&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSYST_2021_3057047
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon