CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks
نویسندگان
چکیده
Drone technology is developing very rapidly. Flying devices accomplishing various applications are becoming an integral part of our daily life undoubtedly. Drones characterized by extreme mobility, decent computing power, scalability, and a short lifetime due to energy constraints. The rise drones inevitably enabled swarms drone networking applications. networks path-breaking subclass flying ad-hoc with unique capabilities specific requirements. One important challenge the device authentication problem, in other words, proving identity single or group that request join swarm. In this paper, we tackle emerging problem propose novel context-aware mutual protocol. proposed protocol provides for groups supports recovering swarm case network separation. Likewise, can handle joins leaves. Moreover, not dependent on infrastructure, secure storage, channels. We tested using automated formal security verification tool, called Scyther. tests resulted complete secrecy claims arbitrary instances all defined use-cases. also shown have proven performance advantages over existing schemes.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملMutual Authentication Protocol for HTTP
This document specifies a mutual authentication method for the Hyper-text Transfer Protocol (HTTP). This method provides a true mutual authentication between an HTTP client and an HTTP server using password-based authentication. Unlike the Basic and Digest authentication methods, the Mutual authentication method specified in this document assures the user that the server truly knows the user’s ...
متن کاملA TESLA-Based Mutual Authentication Protocol for GSM Networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملContext-Aware Authentication Framework
We present an extensible context-aware authentication framework which can adapt to the contextual information available in a smart environment. Having confidence in a user's identity and other contextual information is critical to the successful adoption of future mobile, context-aware services. This authentication framework can provide a standard base for the development of context-aware servi...
متن کاملA Hybrid Mutual Authentication Protocol for RFID
Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems employing low cost RFID tags remains an open problem. In this paper we develop and present a RFID security protocol which not only allows mutual authentication and secure transmission of data between the reader and tag b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3083549