Online citations, reference lists, and bibliographies.
← Back to Search

Authentication Protocols For The Internet Of Drones: Taxonomy, Analysis And Future Directions

M. Wazid, A. K. Das, Jong-Hyouk Lee
Published 2018 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
The Internet of Drones (IoD) provides the coordinated access to controlled airspace for the Unmanned Aerial Vehicles (called drones). The on-going cheaper costs of sensors and processors, and also wireless connectivity make it feasible to use the drones for several applications ranging from military to civilian. Since most of the applications using the drones involved in the IoD are real-time based applications, the users (external parties) usually have their interest in getting the real-time services from the deployed drones belonging to a particular fly zone. To address this important issue in the IoD, there is a great need of an efficient and secure user authentication approach in which an authorized user (for example, a driver of an ambulance) in the IoD environment can be given access to the data directly from an accessed drone. In this article, we first discuss an authentication model used in the IoD communication. We then discuss some security challenges and requirements for the IoD environment. A taxonomy of various security protocols in the IoD environment is also discussed. We then emphasis on the study of some recently proposed user authentication schemes for the IoD communication. A detailed comparative study is done based on functionality features, security attacks, and also communication and computation costs. Through the rigorous comparative study of the existing schemes, we identify the strengths and weaknesses of the user authentication schemes for the IoD communication. Finally, we identify some of the challenges for the IoD that need to be addressed in the coming future.
This paper references
Classifications, applications, and design challenges of drones: A review
M. Hassanalian (2017)
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
A. K. Das (2012)
Competitive agents for information filtering
Paul E. Baclace (1992)
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti (2001)
Security and Privacy for the Internet of Drones: Challenges and Solutions
Chao Lin (2018)
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications
Jongho Won (2017)
Responses to NIST's proposal
R. Rivest (1992)
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
Kisung Park (2017)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
An Internet of Drones
R. Hall (2016)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis (2004)
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
Universally Composable Notions of Key Exchange and Secure Channels
R. Canetti (2002)
Internet of Drones
M. Gharibi (2016)
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
M. Wazid (2016)
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives
Naser Hossein Motlagh (2016)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
S. Zhu (2006)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
On the security of public key protocols
D. Dolev (1981)
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
Provably Secure Authenticated Key Agreement Scheme for Smart Grid
Vanga Odelu (2018)
Access control in wireless sensor networks
Yun Zhou (2007)
Cloud Centric Authentication for Wearable Healthcare Monitoring System
J. Srinivas (2020)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang (2015)
Establishing pairwise keys in distributed sensor networks
D. Liu (2005)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar