Concepedia

Publication | Closed Access

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

282

Citations

31

References

2019

Year

TLDR

In the Internet of Drones, users must be mutually authenticated with drones before exchanging real‑time data, after which a secret session key is established for secure communication. The paper proposes TCALAS, a temporal‑credential based anonymous lightweight authentication scheme for IoD. TCALAS employs temporal credentials to enable anonymous lightweight authentication between users and drones in IoD. Security analysis under the ROR model and automated verification confirm TCALAS resists known passive/active attacks, and comparative evaluation shows it outperforms existing schemes in security, functionality, and computational/communication cost.

Abstract

A user (external party) is interested in accessing the real-time data from some designated drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to provide this facility, the user needs to be authenticated by an accessed remote drone and vice-versa. After successful authentication both parties can establish a secret session key for the secure communication. To handle this important problem in IoD environment, we design a novel temporal credential based anonymous lightweight user authentication mechanism for IoD environment, called TCALAS. A detailed security analysis using formal security under the broadly applied real-or-random (ROR) model, formal security verification under the broadly used software verification tool, known as automated validation of internet security protocols and applications, and also informal security analysis reveal that TCALAS has the capability to resist various known attacks against passive/active adversary. In addition, a detailed comparative study has been conducted for TCALAS and other related schemes, and the study also reveals that TCALAS provides better security and functionality features, and lower costs in both computation and communication as compared to existing schemes.

References

YearCitations

Page 1