A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones

dc.authoridMahmood, Khalid/0000-0001-5046-7766
dc.authoridGhaffar, Zahid/0000-0002-5546-2689
dc.authoridChaudhry, Shehzad Ashraf/0000-0002-9321-6956
dc.authoridDas, Ashok Kumar/0000-0002-5196-9589
dc.contributor.authorMahmood, Khalid
dc.contributor.authorGhaffar, Zahid
dc.contributor.authorFarooq, Muhammad
dc.contributor.authorYahya, Khalid
dc.contributor.authorDas, Ashok Kumar
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.date.accessioned2024-09-11T19:51:57Z
dc.date.available2024-09-11T19:51:57Z
dc.date.issued2024
dc.departmentİstanbul Gelişim Üniversitesien_US
dc.description.abstractThe Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with users and a control center. This interconnected communication framework holds promise for various applications, from collaborative decision-making to real-time data exchange. However, the expansion of communication in IoD also introduces new challenges, particularly in terms of security, privacy and authentication. Unfortunately, the current authentication protocols are inadequate in offering robust security features against various attacks in the IoD environment. To address these security issues and limitations, we proposed a secure protocol for the IoD environment using chaotic maps and hash functions. In addition, we also employed a physically unclonable function in the development of the proposed protocol. We assess the security of the protocol through both informal and formal security analysis. The formal security analysis is conducted through a widely used random or real (RoR) model. The informal analysis shows the rigorous security features against various attacks, such as masquerading, anonymity violation, and physical cloning attacks. Moreover, we compare the performance of the devised protocol with similar existing protocols across important performance parameters, such as communication overhead, computation overhead, and security features. The devised protocol provides a 67.86% and 17.80% reduction in computation and communication overheads, respectively, as compared to related protocols. The analysis demonstrates the proposed protocol's capacity to support secure communication in the IoD environment and satisfy desirable security attributes.en_US
dc.description.sponsorshipAbu Dhabi University's Office of Research and Sponsored Programsen_US
dc.description.sponsorshipNo Statement Availableen_US
dc.identifier.doi10.1109/JIOT.2024.3379930
dc.identifier.endpage22309en_US
dc.identifier.issn2327-4662
dc.identifier.issue12en_US
dc.identifier.scopus2-s2.0-85188881127en_US
dc.identifier.startpage22301en_US
dc.identifier.urihttps://doi.org/10.1109/JIOT.2024.3379930
dc.identifier.urihttps://hdl.handle.net/11363/7870
dc.identifier.volume11en_US
dc.identifier.wosWOS:001242362600112en_US
dc.identifier.wosqualityN/Aen_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.language.isoenen_US
dc.publisherIEEE-Inst Electrical Electronics Engineers Incen_US
dc.relation.ispartofIeee Internet of Things Journalen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.snmz20240903_Gen_US
dc.subjectProtocolsen_US
dc.subjectSecurityen_US
dc.subjectDronesen_US
dc.subjectAuthenticationen_US
dc.subjectChaotic communicationen_US
dc.subjectChebyshev approximationen_US
dc.subjectBiometrics (access control)en_US
dc.subjectAnonymityen_US
dc.subjectauthenticationen_US
dc.subjectimpersonation attacken_US
dc.subjectmutual authenticationen_US
dc.subjectsecurityen_US
dc.titleA Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Dronesen_US
dc.typeArticleen_US

Dosyalar