Online citations, reference lists, and bibliographies.
← Back to Search

Authentication Protocols For The Internet Of Drones: Taxonomy, Analysis And Future Directions

M. Wazid, A. K. Das, Jong-Hyouk Lee
Published 2018 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
The Internet of Drones (IoD) provides the coordinated access to controlled airspace for the Unmanned Aerial Vehicles (called drones). The on-going cheaper costs of sensors and processors, and also wireless connectivity make it feasible to use the drones for several applications ranging from military to civilian. Since most of the applications using the drones involved in the IoD are real-time based applications, the users (external parties) usually have their interest in getting the real-time services from the deployed drones belonging to a particular fly zone. To address this important issue in the IoD, there is a great need of an efficient and secure user authentication approach in which an authorized user (for example, a driver of an ambulance) in the IoD environment can be given access to the data directly from an accessed drone. In this article, we first discuss an authentication model used in the IoD communication. We then discuss some security challenges and requirements for the IoD environment. A taxonomy of various security protocols in the IoD environment is also discussed. We then emphasis on the study of some recently proposed user authentication schemes for the IoD communication. A detailed comparative study is done based on functionality features, security attacks, and also communication and computation costs. Through the rigorous comparative study of the existing schemes, we identify the strengths and weaknesses of the user authentication schemes for the IoD communication. Finally, we identify some of the challenges for the IoD that need to be addressed in the coming future.
This paper references
10.1016/J.PAEROSCI.2017.04.003
Classifications, applications, and design challenges of drones: A review
M. Hassanalian (2017)
10.1007/s10207-012-0162-9
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
A. K. Das (2012)
10.1145/138859.138865
Competitive agents for information filtering
Paul E. Baclace (1992)
10.1109/ACCESS.2017.2676119
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
10.1007/3-540-44987-6_28
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti (2001)
10.1109/MCOM.2017.1700390
Security and Privacy for the Internet of Drones: Challenges and Solutions
Chao Lin (2018)
10.1109/ACCESS.2017.2684128
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications
Jongho Won (2017)
10.1145/129902.129905
Responses to NIST's proposal
R. Rivest (1992)
10.1109/ACCESS.2017.2773535
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
Kisung Park (2017)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
10.1109/MIC.2016.59
An Internet of Drones
R. Hall (2016)
10.1007/978-3-540-24676-3_31
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis (2004)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
10.1007/3-540-46035-7_22
Universally Composable Notions of Key Exchange and Secure Channels
R. Canetti (2002)
10.1109/ACCESS.2016.2537208
Internet of Drones
M. Gharibi (2016)
10.1002/sec.1652
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
M. Wazid (2016)
10.1016/j.adhoc.2014.03.009
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
10.1109/JIOT.2016.2612119
Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives
Naser Hossein Motlagh (2016)
10.1145/1218556.1218559
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
S. Zhu (2006)
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1109/TSG.2016.2602282
Provably Secure Authenticated Key Agreement Scheme for Smart Grid
Vanga Odelu (2018)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.1109/TDSC.2018.2828306
Cloud Centric Authentication for Wearable Healthcare Monitoring System
J. Srinivas (2020)
10.1109/TDSC.2014.2355850
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
10.1145/1053283.1053287
Establishing pairwise keys in distributed sensor networks
D. Liu (2005)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar