Skip to main content
Log in

Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An authentication protocol is one of the fundamental security mechanisms in distributed systems to ensure the integrity and trust level of the nodes during communication. Since message passing is the only way of communication among the systems covered under such an environment, it becomes a necessary condition to check the valid authenticity of the nodes before sending any sensitive information. Such kind of communication between any homogeneous and heterogenous entities (also principals) like, clients, servers, processes etc., must be secure by differentiating the actual legitimate node and intruder node. This process seems to be complex due to the absence of any centralized authority. Nowadays, unmanned aerial vehicle (also, drone)-based network (flying ad hoc network) is in trend due to their versatile dynamic behavior and high applicability region in real-time applications and can be viewed as a special form of distributed network with flying objects. This technology itself is highly capable of carrying any sensitive information from one location to another and also requires much attention for node authentication during the information exchange, which is limited in the existing literature. Hence through our presented work, we studied various distributed authentication protocols and analyzed their possible exposure to flying ad hoc networks. This proposed art-of-study helps to build a sequential relationship to evolve such authentication protocols and opens a unique dimension for flying networks with secure data transfer using these protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

None.

References

  1. Baksi A, Bhasin S, Breier J, Jap D, Saha D (2022) A Survey On Fault Attacks On Symmetric Key Cryptosystems. ACM Comput Surv. https://doi.org/10.1145/3530054

    Article  Google Scholar 

  2. Butilă EV, Boboc RG (2022) Urban Traffic Monitoring and Analysis Using Unmanned Aerial Vehicles (UAVs): A Systematic Literature Review. Remote Sens 14:620. https://doi.org/10.3390/rs14030620

    Article  Google Scholar 

  3. Cacacho HRG, Jay H, Manuel L, Failoga EL, Patrick J (2019) Breaking the Password Security Standards Using Offline Attacks and Public User Attributes, IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM), pp. 1–5. https://doi.org/10.1109/HNICEM48295.2019.9072807

  4. Chen K, Franko K, Sang R (2021) Structured model pruning of convolutional networks on tensor processing units. arXiv preprint arXiv:2107.04191

  5. Euchner F, Christian S (2022) PERIDOT Codes: Replacing Identifiers, Sequence Numbers and Nonces with Permutations. arXiv preprint arXiv:2204.00301

  6. Jackman A (2021) Visualizations of the small military drone: normalization through ‘naturalization.’ Crit Mil Stud. https://doi.org/10.1080/23337486.2020.1846955

    Article  Google Scholar 

  7. Jan SU, Qayum F, Khan HU (2021) Design and Analysis of Lightweight Authentication Protocol for Securing IoD. IEEE Access 9:69287–69306. https://doi.org/10.1109/ACCESS.2021.3076692

    Article  Google Scholar 

  8. Khairallah M (2022) Security of COFB against Chosen Ciphertext Attacks. IACR Transactions on Symmetric Cryptology, pp. 138–157. https://doi.org/10.46586/tosc.v2022.i1.138-157

  9. Limniotis K (2021) Cryptography as the means to protect fundamental human rights. Cryptography 5. https://doi.org/10.3390/cryptography5040034

  10. Lindsay D, Gill SS, Smirnova D et al (2021) The evolution of distributed computing systems: from fundamental to new frontiers. Computing 103:1859–1878. https://doi.org/10.1007/s00607-020-00900-y

    Article  MathSciNet  Google Scholar 

  11. Mohsan SAH, Khan MA, Noor F, Ullah I, Alsharif MH (2022) Towards the Unmanned Aerial Vehicles (UAVs): A Comprehensive Review. Drones 6:147. https://doi.org/10.3390/drones6060147

    Article  Google Scholar 

  12. Naha AMH, Teixeira A, Ahlen A, Dey S (2022) Sequential detection of Replay attacks. in IEEE Transactions on Automatic Control. https://doi.org/10.1109/TAC.2022.3174004

  13. Nurgaliyev, Wang H (2021) Comparative study of symmetric cryptographic algorithms, International Conference on Networking and Network Applications (NaNA), pp. 107–112. https://doi.org/10.1109/NaNA53684.2021.00026.

  14. Parihar AS, Chakraborty SK (2022) A Cross-Sectional Study on Distributed Mutual Exclusion Algorithms for Ad Hoc Networks. In: Gupta, D., Goswami, R.S., Banerjee, S., Tanveer, M., Pachori, R.B. (eds) Pattern Recognition and Data Analysis with Applications. Lecture Notes in Electrical Engineering, vol 888. Springer, Singapore. https://doi.org/10.1007/978-981-19-1520-8_3

  15. Parihar AS, Chakraborty SK (2022) A new resource-sharing protocol in the light of a token-based strategy for distributed systems. Int J Comput Sci Eng. In Press

  16. Parihar AS, Chakraborty SK (2021) Token-based approach in distributed mutual exclusion algorithms: a review and direction to future research. J Supercomput 77:14305–14355. https://doi.org/10.1007/s11227-021-03802-8

    Article  Google Scholar 

  17. Parihar AS, Chakraborty SK (2023) A new resource sharing protocol in the light of token-based strategy for distributed system. Int J Comput Sci Eng 26(1):78–89. https://doi.org/10.1504/IJCSE.2023.10054279

    Article  Google Scholar 

  18. Parihar AS, Chakraborty SK (2022) Token Based k-Mutual Exclusion for Multi-UAV FANET. Wireless Pers Commun. https://doi.org/10.1007/s11277-022-09886-6

    Article  Google Scholar 

  19. Parihar AS, Chakraborty SK (2022) Handling of resource allocation in flying ad hoc network through dynamic graph modeling. Multimed Tools Appl 81:18641–18669. https://doi.org/10.1007/s11042-022-11950-z

    Article  Google Scholar 

  20. Parihar AS, Prasad D, Gautam AS, Chakraborty SK (2021) Proposed End-to-End Automated E-Voting Through Blockchain Technology to Increase Voter’s Turnout. In: Prateek, M., Singh, T.P., Choudhury, T., Pandey, H.M., Gia Nhu, N. (eds) Proceedings of International Conference on Machine Intelligence and Data Science Applications. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-4087-9_5

  21. Rajasekaran AS, Maria A, Al-Turjman F, Altrjman C, Mostarda L (2022) Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET. Drones 6(14). https://doi.org/10.3390/drones6010014

  22. Ravinder N, Hrushikesava Raju S, Kantha Rao G, Rajesh N, Murali Mohan V, Mandhala VN (2021) Smart Retail Goods Delivery: A Novel Approach for Delivery of Online Store Products Using IoT. In: Venugopal, K.R., Shenoy, P.D., Buyya, R., Patnaik, L.M., Iyengar, S.S. (eds) Data Science and Computational Intelligence. ICInPro. Communications in Computer and Information Science, Volume 1483. Springer, Cham. https://doi.org/10.1007/978-3-030-91244-4_39

  23. Schindler C, Atas M, Strametz T, Feiner J, Hofer R (2022) Privacy Leak Identification in Third-Party Android Libraries, Seventh International Conference on Mobile And Secure Services (MobiSecServ), pp. 1–6. https://doi.org/10.1109/MobiSecServ50855.2022.9727217

  24. Shen Y, Sun Z, Zhou T (2021) Survey on Asymmetric Cryptography Algorithms, International Conference on Electronic Information Engineering and Computer Science (EIECS), 2021, pp. 464-469. https://doi.org/10.1109/EIECS53707.2021.9588106

  25. Shenets NN (2019) Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption. Aut Control Comp Sci 53:857–864. https://doi.org/10.3103/S0146411619080297

    Article  Google Scholar 

  26. Srivastava A, Prakash J (2021) Future FANET with application and enabling techniques: Anatomization and sustainability issues. Comput Sci Rev 39:100359. https://doi.org/10.1016/j.cosrev.2020.100359. (ISSN 1574-0137)

    Article  MathSciNet  Google Scholar 

  27. Thomas L, Gondal I, Oseni T, Firmin S (2022) A framework for data privacy and security accountability in data breach communications. Comput Secur 116:102657. https://doi.org/10.1016/j.cose.2022.102657. (ISSN 0167-4048)

    Article  Google Scholar 

  28. Underwood RG (2022) Public Key Cryptography. In: Cryptography for Secure Encryption. University text. Springer, Cham. https://doi.org/10.1007/978-3-030-97902-7_9

  29. Yuan Y, Mo Y (2020) Security for cyber-physical systems: Secure control against known-plaintext attack. Sci China Technol Sci 63:1637–1646. https://doi.org/10.1007/s11431-020-1621-y

    Article  Google Scholar 

  30. Zukarnain ZA, Muneer A, Ab Aziz MK (2022) Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges. Symmetry 14:821. https://doi.org/10.3390/sym14040821

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashish Singh Parihar.

Ethics declarations

Conflict of interest

The authors have no conflict of interest in relation to this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, A., Barthwal, A., Vardhan, H. et al. Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET. Multimed Tools Appl 82, 42311–42330 (2023). https://doi.org/10.1007/s11042-023-15197-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15197-0

Keywords

Navigation