A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
Autor: | Yan-Xing Li, Yuan Lei, Haisheng Qin, Lining Zeng, Mei-Xia Wang |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2021 |
Předmět: |
General Computer Science
Computer science UAV 02 engineering and technology security lightweight authentication Computational resource Internet of Drones Resource (project management) Intelligent sensor Server 0202 electrical engineering electronic engineering information engineering General Materials Science Protocol (object-oriented programming) Authentication business.industry 020208 electrical & electronic engineering General Engineering 020206 networking & telecommunications Proverif Authentication protocol The Internet lcsh:Electrical engineering. Electronics. Nuclear engineering business lcsh:TK1-9971 Computer network |
Zdroj: | IEEE Access, Vol 9, Pp 53769-53785 (2021) |
ISSN: | 2169-3536 |
Popis: | The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security. |
Databáze: | OpenAIRE |
Externí odkaz: |