CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks

نویسندگان

چکیده

Drone technology is developing very rapidly. Flying devices accomplishing various applications are becoming an integral part of our daily life undoubtedly. Drones characterized by extreme mobility, decent computing power, scalability, and a short lifetime due to energy constraints. The rise drones inevitably enabled swarms drone networking applications. networks path-breaking subclass flying ad-hoc with unique capabilities specific requirements. One important challenge the device authentication problem, in other words, proving identity single or group that request join swarm. In this paper, we tackle emerging problem propose novel context-aware mutual protocol. proposed protocol provides for groups supports recovering swarm case network separation. Likewise, can handle joins leaves. Moreover, not dependent on infrastructure, secure storage, channels. We tested using automated formal security verification tool, called Scyther. tests resulted complete secrecy claims arbitrary instances all defined use-cases. also shown have proven performance advantages over existing schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Mutual Authentication Protocol for HTTP

This document specifies a mutual authentication method for the Hyper-text Transfer Protocol (HTTP). This method provides a true mutual authentication between an HTTP client and an HTTP server using password-based authentication. Unlike the Basic and Digest authentication methods, the Mutual authentication method specified in this document assures the user that the server truly knows the user’s ...

متن کامل

A TESLA-Based Mutual Authentication Protocol for GSM Networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Context-Aware Authentication Framework

We present an extensible context-aware authentication framework which can adapt to the contextual information available in a smart environment. Having confidence in a user's identity and other contextual information is critical to the successful adoption of future mobile, context-aware services. This authentication framework can provide a standard base for the development of context-aware servi...

متن کامل

A Hybrid Mutual Authentication Protocol for RFID

Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems employing low cost RFID tags remains an open problem. In this paper we develop and present a RFID security protocol which not only allows mutual authentication and secure transmission of data between the reader and tag b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3083549