SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
نویسندگان
چکیده
Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet vehicles) envision the simultaneous collection types. Although authentication prevent unauthorized users access collected data, existing solutions do not distinguish between different types by drones. Therefore, authenticated receive sensitive regarding another user incurring hence in privacy leakage. In this paper, we propose SETCAP, novel Service-Based Energy-Efficient Temporal Credential Authentication Protocol for IoD. SETCAP exploits distinction information We formally test against Real-Or-Random (ROR) model and implemented Automated Validation Security Protocols Applications (AVISPA) simulation tool. Moreover, validated via non-mathematical security analysis show its many attacks. assessed superiority terms functionality characteristics well computation, communication, energy costs. The communication cost creating session approximately 20% smaller than closest state-of-the-art protocol. Furthermore, requires creation number sessions are additive users, whereas multiplicative. therefore secure scalable solution resource-constrained devices such
منابع مشابه
Energy Efficient Multi Path Routing Protocol in Internet of Things
Internet of things (IoT) is a network with a wide range of smart and physical objects and gadgets that can exchange information with each other. IOT introduces a variety of services that human life is dependent on its secure and accessible activities. These networks face numerous problems in terms of energy consumption and reliable communication to send the correct data. Moreover, the character...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملGame Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network
Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2022
ISSN: ['1872-7069', '1389-1286']
DOI: https://doi.org/10.1016/j.comnet.2022.108804