Skip to main content

Advertisement

Log in

IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In recent times, sensor node or smart camera can be embedded in the drones for the collection of important data with the help of Internet Technology. Several security threats/vulnerabilities may hamper the system while collecting data. Hence, strong protection against security attacks is essential in drone based data collection system. In this work, we have considered a drone based cloud enable architecture for collecting and sharing information. The aim of this paper is to design a lightweight security protocol which will provide secure communication and mutual authentication among the entities. The proposed protocol establishes temporary session key for each session in order to make the complete system security attacks free. We have simulated the proposed protocol for measuring security strength using Scyther simulation whose results show all the claimed parameters are private during protocol run. It also ensures the correctness of mutual authentication. The informal analysis confirms strong protection on all security threats related to proposed architecture. The performance analysis has also made which shows that the protocol is lightweight and achieves better efficiency in comparison with related published works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Abdussami Mohammad, Amin Ruhul, Vollala Satyanarayana (2022) Lassi: a lightweight authenticated key agreement protocol for fog-enabled iot deployment. Int J Inform Secur 21(6):1373–1387

    Article  Google Scholar 

  • Abdussami M, Amin R, Vollala S (2023) Provably secured lightweight authenticated key agreement protocol for modern health industry. Ad Hoc Netw. https://doi.org/10.1016/j.adhoc.2023.103094

    Article  Google Scholar 

  • Alladi T, Chamola V, Kumar N et al (2020) Parth: A two-stage lightweight mutual authentication protocol for uav surveillance networks. Comput Commun 160:81–90

    Article  Google Scholar 

  • Bera Basudeb, Chattaraj Durbadal, Das Ashok Kumar (2020) Designing secure blockchain-based access control scheme in iot-enabled internet of drones deployment. Comput Commun 153:229–249

    Article  Google Scholar 

  • Challa Sravani, Wazid Mohammad, Das Ashok Kumar, Kumar Neeraj, Reddy Alavalapati Goutham, Yoon Eun-Jun, Yoo Kee-Young (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043

    Article  Google Scholar 

  • Choudhary G, Sharma V, Gupta T, Kim J, You I (2018) Internet of drones (iod): Threats, vulnerability, and security perspectives. arXiv preprint arXiv:1808.00203, pages 1–1

  • Gharibi M, Boutaba R, Waslander SL (2016) Internet of drones. IEEE Access 4:1148–1162

    Article  Google Scholar 

  • Hall Robert J (2016) An internet of drones. IEEE Internet Comput 20(3):68–73

    Article  Google Scholar 

  • Kasmalkar G, Deshpande K (2019) Start-ups track isec 2019. In Proceedings of the 12th Innovations on Software Engineering Conference (formerly known as India Software Engineering Conference), pages 1–2

  • Koubâa Anis, Qureshi Basit, Sriti Mohamed-Foued, Allouch Azza, Javed Yasir, Alajlan Maram, Cheikhrouhou Omar, Khalgui Mohamed, Tovar Eduardo (2019) Dronemap planner: A service-oriented cloud-based management system for the internet-of-drones. Ad Hoc Netw 86:46–62

    Article  Google Scholar 

  • Raimondi FM, Trapanese M, Franzitta V, Viola A, Colucci A (2015) A innovative semi-immergible usv (si-usv) drone for marine and lakes operations with instrumental telemetry and acoustic data acquisition capability. In OCEANS 2015-Genova, pages 1–10. IEEE

  • Srinivas J, Das AK, Kumar N, Rodrigues J (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Depend Secur Comput 17(5):942

    Article  Google Scholar 

  • Srinivas J, Das AK, Kumar N, Rodrigues JJ (2019) Tcalas: Temporal credential-based anonymous lightweight authentication scheme for internet of drones environment. IEEE Trans Veh Technol 68(7):6903–6916

    Article  Google Scholar 

  • Sureshkumar Venkatasamy, Amin Ruhul, Anitha R (2018) A robust mutual authentication scheme for session initiation protocol with key establishment. Peer Peer Netw Appl 11(5):900–916

    Article  Google Scholar 

  • Sureshkumar V, Anandhi S, Madhumathi R, Selvarajan N (2019b) Light weight authentication and key establishment protocol for smart vehicles communication in smart city. In International Conference on Smart City and Informatization, pages 349–362. Springer

  • Tai Wei-Liang, Chang Ya-Fen, Li Wei-Han (2017) An iot notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. J Inform Secur Appl 34:133–141

    Google Scholar 

  • Tian Yifan, Yuan Jiawei, Song Houbing (2019) Efficient privacy-preserving authentication framework for edge-assisted internet of drones. J Inform Secur Appl 48:1023–1054

    Google Scholar 

  • Turkanović Muhamed, Brumen Boštjan, Hölbl Marko (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  • Venkatasamy Sureshkumar, Amin Ruhul, Vijaykumar VR, Sekar SR (2019) Robust secure communication protocol for smart healthcare system with fpga implementation. Future Gener Comput Syst 100:938–951

    Article  Google Scholar 

  • Wazid Mohammad, Das Ashok Kumar, Kumar Neeraj, Vasilakos Athanasios V, Rodrigues Joel JPC (2018) Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet Things J 6(2):3572–3584

    Article  Google Scholar 

  • Won Jongho, Seo Seung-Hyun, Bertino Elisa (2017) Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 5:3721–3749

    Article  Google Scholar 

  • Won J, Seo S, Bertino E (2015) A secure communication protocol for drones and smart objects. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pages 249–260

  • Zhang Y, He D, Li L, Chen B (2020) A lightweight authentication and key agreement scheme for internet of drones. Comput Commun. 154:455–64

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruhul Amin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Amin, R., Jayaswal, S., Sureshkumar, V. et al. IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication. J Ambient Intell Human Comput 14, 9529–9542 (2023). https://doi.org/10.1007/s12652-023-04623-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-023-04623-8

Keywords

Navigation