Saeed Ullah Jan,Irshad Ahmed Abbasiand Fahad Algarni
1Department of Computer Science&IT,University of Malakand,Chakadara,18800,Pakistan
2Faculty of Science&Arts Belqarn,Department of Computer Science,University of Bisha,Sabtul Alaya 61985,Saudi Arabia
3Faculty of Computing and Information Technology,University of Bisha,Bisha 67714,Saudi Arabia
Abstract: With the rapid miniaturization in sensor technology, Internet-of-Drones (IoD)has delighted researchers towards information transmission security among drones with the control station server(CSS).In IoD,the drone is different in shapes,sizes,characteristics,and configurations.It can be classified on the purpose of its deployment,either in the civilian or military domain.Drone’s manufacturing, equipment installation, power supply, multi-rotor system,and embedded sensors are not issues for researchers.The main thing is to utilize a drone for a complex and sensitive task using an infrastructureless/self-organization/resource-less network type called Flying Ad Hoc Network(FANET).Monitoring data transmission traffic,emergency and rescue operations, border surveillance, search and physical phenomenon sensing,and so on can be achieved by developing a robust mutual authentication and cross-verification scheme for IoD deployment civilian drones.Although several protocols are available in the literature,they are either design issues or suffering from other vulnerabilities;still,no one claims with conviction about foolproof security mechanisms.Therefore,in this paper,the researchers highlighted the major deficits in prior protocols of the domain,i.e.,these protocols are either vulnerable to forgery,side channel,stolen-verifier attacks,or raised the outdated data transmission flaw.In order to overcome these loopholes and provide a solution to the existing vulnerabilities,this paper proposed an improved and robust public key infrastructure (PKI)based authentication scheme for the IoD environment.The proposed protocol’s security analysis section has been conducted formally using BAN(Burrows-Abadi-Needham)logic, ProVerif2.03 simulation, and informally using discussion/pragmatic illustration.While the performance analysis section of the paper has been assessed by considering storage,computation,and communication cost.Upon comparing the proposed protocol with prior works,it has been demonstrated that it is efficient and effective and recommended for practical implementation in the IoD environment.
Keywords:Cryptography;authentication;confidentiality;reachability;ZSP
Earlier, drones were mainly used for military mission delivery.However, with the invention of small unmanned aerial vehicles(UAVs or drones)becoming opened new possibilities to be applied in incident monitoring,search and rescue operations,disaster relief,and packages’delivery.A popular Mobile Ad hoc Network (MANET)paradigm is Flying Ad hoc Networks (FANETs)are used for data transmission in the IoD environment.In contrast to other ad hoc network types, FANETs are distinguished by many unique features because it changes their topology dynamically [1].Due to which it presents the research community with security challenges.The only solution to these security challenges is to design a robust authentication protocol for FANET to establish an efficient data transmission with the control station server.Besides security,energy consumption is also a big issue in UAVs (drones).As some tasks assigned to a drone need maximum flight time, while the electric power is not too to accomplish it, if the internal processing capabilities become modified without affecting its external functionalities, it can guarantee a complex operation with minimum power consumption.In this regard, the computation process to generate shared session key also needs to be adequate to transmit information among all the participants of IoD efficiently.This challenge is also possible by designing a protocol with fast and secure computation and communication features for data broadcasting[2].
In the Information society, cryptographic algorithms play a crucial role, and they secure us when we use debit cards or credit cards, call someone on a cell phone, get access to health care services, or buy something on the internet.These algorithms ensure that our transactions and bank accounts are secure,our telephone,voice-over-internet protocol(VoIP),or instant messaging cannot be listened to by anyone, and that confidential health information is protected from unauthorized access.Cryptographic protocols support digital signatures, user and data authentication, and more advanced functionalities such as electronic money or electronic voting,e-government,and e-commerce in the near term[3].Moreover,a cryptographic hash function is a technique for verifying data validity,can run on data for checksum purposes, and cryptographically encompasses algorithms for cyclic redundancy checks.It translates data of arbitrary size into a fixed valued numerical string called a hash[4].In the same way,the researchers in this paper have used cryptographic algorithms to design a security mechanism for working in the IoD environment.
Furthermore, the already available cryptographic algorithms can also be used to secure the transmission path of drones with the control station server or external user to perform a tactical task.However,due to the existence of a strong adversary,only cryptographic-based protocols cannot achieve the goal of sensitive transmission security in IoD.It must need to be appropriately formalized;so that one must determine what the opponent/adversary is permitted to do and when the attack is successful.Under any complexity assumption, a cryptosystem would be “secure”if it demonstrates that the security principle is fulfilling, and the attacker could not crack the protocol [5].However,a cryptographic system’s security is most often proximate: its security is based on an assumption of complexity which is commonly believed in confidentiality.In the cryptographic research community,these methodologies are now the standard [6].We, too, will first identify all possible threats to the system, design a cryptographic-based security mechanism, then evaluate its security as stated above and pragmatically illustrate them in the informal security analysis section of the paper to make it trustworthy in drone information transmission security for IoD.
Although,the increasing use of drones is raising security issues.Without incorporating the issue of security in the IoD, we cannot mitigate all other associated issues and challenges like power and navigation, product and traffic, privacy and obstacle detection, etc.Therefore, this research focuses on designing cryptographic hash functions, XOR operations, and public key infrastructure (PKI)based authentication protocol for IoD using FANET.Because the security of exchanged information among all the IoD’s participants is a challenging issue, it needs a robust, lightweight authentication protocol.The authentication protocol presented in this paper can extract dynamic identities and random numbers to ensure the dynamism feature in the protocol.The cryptographic hash-based function assimilates different security features like untraceability and anonymity and caters to the flaw of outdated data broadcasting.All these cryptographic algorithms (PKI, hash, XOR, SHA-1,MD5,AES,etc.)collaboratively used for the protocol design can guarantee to mitigate forgery,side channel, privileged insider, and stolen verifier attacks often seen in prior authentication protocols.Furthermore, it can show resistance to known attacks such as denial of service (DoS), man-in-themiddle,replay,drone capture attacks,and spoofing with other drones.
According to this model, a valid user must first register with the control station registry, and then a drone must also register with CSS.It is worth noting that the control station server has been designated as a wholly trusted individual.Their confidence must be consistent as a lack of trust could jeopardize the system’s reliability.The proposed scheme means that the user and the remote server will fully trust the registration center,while any other entity alone cannot be fully trusted.Gharibi et al.[1]defined the flying zone strategy for a large geographical region in detail.We also consider their zone strategy for achieving impartiality,modularity,and standardization so that a drone can securely communicate with the ground station and external users.According to Gharibi et al.[1], for each drone,the Zone Service Provider(ZSP)is responsible to facilitate a drone for navigation services and designate zone on the request of a drone.Also,ZSP has the authority to put orders for landing drone,hold the drone in the current flying zone, or switch drones from one flying zone to another.ZSP planned collision-free navigation services to a drone, route maintenance between two drones, along many performance characteristics.
Furthermore,to cover a larger area,such as an entire country,the ground stations must communicate logically with one another.This technique would track drones in a cluster at various flying zones,traffic,and drone switching from one flying zone to another and provide mandatory statistics.[1]also clarified handover strategies when a drone moves from one flying zone to another,as shown in Fig.1.
In Fig.1, the certification for all drones is considered from a specialized framework installed within CSS,providing networking,information management support,and real-time problem-solving capabilities.The CSS is in charge of controlling,monitoring,and supervising drone navigation services.Network services and a wireless communication interface are also needed on all drones and are closely supervised by the CSS.The flight zones are another challenge for the CSS, and the drone must be operationalized in pre-determined flight zones/clusters.An external user can access a designated drone from a specific zone is also monitored by the CSS.CSS controls its flight and verifies its existence when a drone enters the IoD environment.The confirmation authenticity of a legitimate drone or the identification of an unauthorized drone in the flying zone can also easily be detected by the CSS due to its services agent capabilities.
Figure 1:System model
Any public networked-based correspondence may be altered, eavesdropped on, or snooped on by an intruder.An adversary can pose as an authentic node at a specific location and initiate contact with the legal peer.However,an adversary cannot reach the server to access the internal secret without authorization.However, he or she may compromise some tags to obtain the shared session key.Furthermore, an adversary has complete authority to begin negotiations with a legitimate client, to insert false tags with the standard message in a public network channel during contact,to remove the entire or part of the message,to copy the message and replay it at a later time[6].
Malicious users(attackers)have become more powerful nowadays.Therefore,all possible attacks are easy to launch against a legitimate user.Further,malicious users have many capabilities,such as editing,deleting,modifying,and blocking messages over IoD wireless networks.The possible threats against real users are: routing and session key threats, unauthorized access untraceability threats,perfect forward secrecy and data leakage threats, signal jamming and privacy threat, flight control and collation threats,signal spoofing and forgery threats,insider and deauthentication threats,stolen verifier and desynchronization threats, masquerade and impersonation threats, and clogging and ephemeral secret leakage threats.
During peer authentication, efficient and secure management of keys (random numbers or public/private)pair is difficult to keep secret from a strong adversary.However,cryptographers[7,8]developed a scenario in which first the key pair is generated,secondly professionally deployed(public key is for encryption and private for decryption),and finally,the process of overturning it is performed.The overturning or invalidation step is initiated when the whole session is accomplished then the key pair becomes null or compromised.Therefore,to achieve secure communication over the public,insecure networks, protocols for the mutual authentication of two parties, and the generation of a cryptographically generated shared key among the participants are fundamental.In contrast, the cryptographically-hash-based message authentication code depends on cross-verified session shared keys that need dynamic updates,as shown in Fig.2.
Figure 2:Single,double,and triple secret exchange scenarios
For encrypting/decrypting the message using a single key or to secretly transmit a message without changing its size, a bit-wise XOR technique is used.It is a well-known technique in information security;a message having XOR cannot be cracked,which is also known as a one-time-pad[6].
This article presents a PKI-based authentication protocol for IoD using FANET.The protocol offered in this research paper authenticates each participant(Uia,Vja,CSS)before procuring data from the drone using FANET.This lightweight and resource-efficient authentication protocol use SHA-1,PKI,XOR operations,and AES(Advanced Encryption Standard)for a secure key generation before broadcasting data with each other.The main contributions of the research work are as under:
1.The protocol concentrates on generating secure keys among users,drone,and CSS,consisting of user’s password change, dynamic drone addition, and drone revocation/reissue phases.Besides, the hash function, which is used for cyclic checksum, has fewer storage overheads and high security.It also allows joint public network channels between User →Drone,Drone→CSS,CSS →Drones,and Drone →CSS without performance loss.
2.The protocol offered in the article is validated using BAN logic and ProVerif2.03.A comprehensive, pragmatic illustration for prominent attacks shows that the scheme is verifiably protected against each.
3.A comparative analysis section has been offered by considering three aspects, computation,storage,and communication costs which shows that the scheme is better than the state-of-theart protocols.
The drone’s computing resources are severely limited, making it vulnerable to various security threats such as replay attacks, forgery attacks, and man-in-the-middle attacks.Seriously, a drone’s surveillance work in smart cities could cause serious harm at any moment.He et al.[5]suggested an elliptic curve cryptography-based lightweight identity authentication scheme.However,they neglect to mention drone addition,revocation,and password update phases.According to[9],malicious drone in contact between ground stations and drone causes data transmission and instruction data leakage.The identity authentication,validity,reliability,and privacy of a drone with the ground station have been addressed by[10]but do not offer perfect forward secrecy.
According to[11],low latency authentication plays a fundamental role on the internet of drones in a disaster environment where latency is between life and death.Furthermore,unauthorized access,energy consumption, and latency concern the internet of the drone’s network [3].The author [12]proposed a lightweight protocol that achieved performance but compromised security and could not resist most attacks.Another mutual authentication protocol was proposed in[13],and the scheme is based on PUF but failed to provide comprehensive security.The protocol proposed in[14]provides poor performance,leading to a fatal accident in IoD networks.
Furthermore,the author[15]cryptanalysis the scheme[16]and finds out that they cannot resist stolen authentication and traceability issues.According to[17],the scheme used in[18]suffers from session key leakage,inability to provide user anonymity,and scalability issues.Moreover,the scheme[19]used the same certificate in the authentication phase;thus,it does not provide anonymity.
In recent years,the idea of the Internet of Things(IoT)has been implemented for the IoD environment.The data,communication,and network technology are incorporated for drones in IoD because it is used for consumer conveniences like entertainment,toys,agricultural-land monitoring,high-value industries,and wide applications in the defence field shooter product[10].Suppose improved battery power,sensing systems,communication security,and other technologies and incorporating them into drone technologies can become a top-rated product in recent years, advancing various fields and activities.In that case,small UAVs have enormous potential and have significant application versatility.In addition to personal aerial photography,entertainment,and commercial markets,they can be used in a range of surveillance activities,such as disaster relief,in diverse environments involving animals and plants,coasts and borders,in the transport of goods,military,and police enforcement tasks,and also in agricultural and industrial applications.Also, the smart city features like traffic monitoring and management,merchandise distribution,health and emergency services,and air taxi services,for example, will increase the efficiency, effectiveness, timeliness, reliability, and performance of these services and may help reduce the cost of delivering these services[20].
Small UAVs, however, can also pose many security threats when misused.Different researchers made several attempts to secure its data transmission.For example, Hussain et al.[21] proposed an elliptic curve cryptographic-based authentication scheme to secure the communication of external users and drones in the pre-defined flying zone.After successful information broadcasting,the drones can then be deployed for different applications like broadening IoT base IoD,smart cities surveillances,sidewalk monitoring, and stealth purposes.Yahuza et al.[22] identified flaws in some prior IoDbased protocols like switching drones from one flying zone to another needed a robust mechanism for self-organizing its previous secure transmission path.They mitigated the flying zone flaw and proposed a provably secure protocol, and named it SLPAKA.Gope et al.[23] claimed that robust information authentication is necessary to successfully deploy UAVs in crop spraying,public safety,and critical infrastructure surveillance.For this, they proposed a privacy-aware edge-assisted UAVs protocol by taking into account the procedure for resistance of UAVs from physical capturing.Tian et al.[24] also proposed a security framework for edge-assisted IoD using the securely computed authenticated key in online and offline mode for efficient open-access communication.However,due to batch verification of the signature, the computation tie complexity of their framework is not good.Ever [25] demonstrated that the key features of drone-like mobility, energy consumption,reliability, and efficiency for an open network are fundamental because all the IoD participants are not designed with an integrated security phenomenon.Therefore,they proposed a security framework for IoD using WSN.They used the elliptic curve discrete logarithmic function to secure participants’computing keys.However, it still suffered from a key-escrow problem; [26] provision of secure and efficient communication between drone & ground station for smart city surveillance, [27] secured the confidential data transmission between drones in IoD environment, [28] presented protocol for public cloud data security in IoT enabled equipment using MANET,and[29]presented three-factor key-agreement protocol for network-enabled devices using WSN.Similarly, [30] demonstrated an authentication scheme for an e-health-care system using WMSN,and[31]published a homomorphic encryption-based authentication scheme for IoD environment in which innovative knowledge for the different environments has been presented.Also,[32]proposed a privacy protection protocol for grid computing has been presented in which guarantees secure communication between service providers and smart objects, and [33] presented a three-factor (password, smart-card and biometric)based authentication scheme,which works for Unmanned Aerial Vehicular Networks.
Zhang et al.[14]designed a one-way hash function based on authentication and key agreement scheme for the Internet of Drone in which they claim that their scheme can guarantee for cross verification of each participant during communication.They presented the scheme in three phases:setup, registration, and mutual authentication.After the extensive analysis, it has been noted that their scheme is suffering from the following drawbacks:
1.An attacker can intercept the first message sent between the user and the control server,which leads to forgery attacks.The intruder may then modify the timestamp ST1,but the CS would not detect this.Furthermore, if an intruder physically captures the drone [14], store security credentials in its memory to participate in the authentication protocol;as a result,an attacker can gain access to the memory or use side-channel attacks to obtain the stored credentials.It means the scheme is suffering from side-channel attacks.
2.If an attacker forges the previous or current session key SKij, as the verification data is without encryption, the attacker can then transmit it towards the control center (SC)and force it to declare himself/herself as a legal user for the upcoming authentication session.For example, let suppose an attackerAcan steal {M5, M6, M7} message from the open network channel and transmit it towards drone.Vjacomputes r1//=M5⊕h(PIDj||αj),PIDi//=M6⊕h(PIDj||PIDs||αj||r1//), M7/=h(PIDi//||PIDj||PIDs||αj||r1//)and forced drone to confirmed: M7/?=M7.Next attackerAgenerates random number rAand computes:M8=h(PIDj||PIDi//)⊕rA, and M9=h(r1//||rA).Further he/she might calculate session key SKij=h(PIDi//||PIDj||PIDs||M9)which,then can be used for potential reply,DoS,insider and stolen-verifier attacks.Therefore,Zhang et al.[14]scheme is not safe against these attacks.
3.Zhang et al.[32] used ST1in the first round trip, while they forgot to use it in the next two round trips,which in turn does not guarantee the transmission of new data among drone and control centers(SC).Therefore,the scheme suffers from outdated data transmission flaws.
4.Since the scheme only uses a timestamp for the first-round trip and does not use a timestamp for any subsequent round trips,it suffers from a global time-synchronization issue.
To solve the weaknesses mentioned in Zhang et al.[14]scheme above,we,as a result of this,have proposed the following improved scheme consisting of 1)setup phase,2)registration phase,3)mutual authentication and cross-verification phase, 4)user’s biometric/password update Phase, 5)dynamic drone addition phase,and 6)drone revocation/reissue phases,each of these are described one by one as under,while the different notations used for designing the scheme are shown in Tab.1.
Table 1: Notations and its description
Let the control station server (CSS)choose a random numberlcalled a public key,sis a secret key and dispatches public parameterspms.Furthermore, CSS chooses collision-free one-way-hash function h(.)∈Zq*,identity IDsand calculates PIDs=h(IDs||s).The control station server(CSS)stores{l,s}and issues{PIDs,h(.),pms}.The CSS useslfor encryption(Public key),sfor decryption(private)in one session,and different keys for the next session.
This phase of the proposed scheme is divided into two sub-phases:
4.2.1 User’s Registration
This sub-phase of the scheme,completed in the following steps:
i.A legitimate user chooses his/her identity IDia,password PWiaand sends a registration request towards the control station server(CSS)over a secure channel.
ii.Upon receiving the registration request, the control station server (CSS)computes PIDia=h(IDia||s),Ai=h(IDia||l),store{PIDia,Ai,IDia}and transmit{PIDia,Ai}towards user over a secure channel.
iii.Upon receiving {PIDia, Ai}, the user imprints his/her biometrics BIOia, and computes:Gen(BIOia)=(σia,τia), Aim=h(IDia||PWia)⊕Ai, and PIDiam=h(IDia||PWia)⊕PIDiawhereσia&τiaare biometric keys associated with BIOia.Finally, Uiastores {Aim, PIDiam, Gen(.),Rep(.)} in its memory.Biometric Gen(.)and Rep(.)functions to concealed credentials from privileged user,as shown in Module I.
Module I:User’s registration phase
4.2.2 Drone’s Registration Phase
This sub-phase of registration phase is accomplished on the following steps:
i.A drone randomly selects IDjaand transmits it to the control station server(CSS)over a secure channel.
ii.Upon receiving the request message, the control station server (CSS)computes PIDja=h(IDja||s), Aj=h(IDja||l)stores {IDja, PIDja, Aj} and sends {PIDja, Aj} towards drone over a private channel.
iii.Upon receiving the message of CSS,the drone stores{PIDja,Aj}in its memory for future usage,as shown in Module II.
Module II:Drone’s registration phase
After registering user(Ui)and drone(Vj),they can communicate with each other subject to the condition that they can compute a secret shared session key SK.For such purpose,the following steps will perform:
i.The user first enters his/her IDia,PWia,imprints biometric BIO/iaand computesσ/ia=Rep(BIOia,τia),PIDia=PIDiam⊕h(IDia||PWia),Ai=Aiam⊕h(IDia||PWia).Next generate a number R1∈Z*n,present timestamp ST1and compute:M1=h(PIDs||ST1)⊕PIDia,M2=h(PIDia||PIDs||Ai)⊕R1,M3=h(PIDia||PIDs||Ai||R1)⊕PIDja, M4=h(PIDia||PIDja||PIDs||Ai||R1)and transmits {M1,M2,M3,M4,ST1}message towards control server over a public network channel.Here using public key for the encryption of h(PIDja||PIDia//||ST3)⊕R2message.
ii.Upon receiving{M1,M2,M3,M4,ST1}message,the CSS checks the received timestamp with the current system time (Tc-ST1≤ΔT), if not found within the prescribed time threshold,the CSS consider it for potential replay attack and stops computation.But when found valid,CSS decrypts M1using private keysand computes PIDia/=M1⊕h(PIDs||ST1)and retrieves Ai/and calculates R1/=M2⊕h(PIDia/||PIDs||Ai/), PIDja/=M3⊕h(PIDia/||PIDs||Ai/||R1/)and M4/=h(PIDia/||PIDja/||PIDs||Ai/||R1/).The control station server(CSS)confirms M4/?=M4,if found no confirmation, the process is terminated, else, it generates another timestamp ST2and computes M5=h(PIDja/||Aj/||ST2)⊕R1/,M6=h(PIDja/||PIDs||Aj/||R1/)⊕PIDia/,M7=h(PIDia/||PIDja/||PIDs||Aj/||R1/)and transmits{M5,M6,M7,ST2}message towards drone over a public network channel.
iii.Upon receiving{M5,M6,M7,ST2}message,drone first check the timestamp with system time(Tc-ST2≤Δ T),computes R1//=M5⊕h(PIDja||Aj),PIDia//=M6⊕h(PIDja||PIDs||Aj||R1//)and M7/=h (PIDia//||PIDja||PIDs||Aj||R1//), confirms M7/?=M7, if found no validation,the drone rejects the authentication request, else, it generates random number R2∈Z*n, ST3and computes M8=h (PIDja||PIDia//||ST3)⊕R2, M9=h (R1//||R2), SKiaja=h(PIDia//||PIDja||PIDs||M9),M10=h(PIDia//||PIDja||PIDs||R1//||R2||M9)and sends{M8,M9,M10,ST3}message towards CSS over a public channel.Here M8must perform encryption usingli.e.,M8=El(h(PIDja||PIDia//||ST3)⊕R2).
iv.The CSS,when receiving{M8,M9,M10,ST3}message,check the time,decrypt M8,and computes,R2/=M8⊕h(PIDja|PIDia||R1),M9/=h(R1||R2/),and M10=h(PIDia||PIDja||PIDs||R1||R2/).It then Confirms:M10/?=M10,if matches,compute:SKiaja=h(PIDia||PIDja||PIDs||M9/),else,stop calculation.Finally,{M8,M9,M10,ST4}message towards the user.
v.The user,upon receiving{M8,M9,M10,ST3}message,checks drone time with its current time(Tc-ST3≤ΔT),if found no validation,the process is discarded,else,it decrypts M8using s and computes R2/=M8⊕h(PIDja|PIDia||R1),M9/=h(R1||R2/),M10=h(PIDia||PIDja||PIDs||R1||R2/),confirms M10/?=M10,if found no validation,the process once again be terminated,otherwise keeps SKiaja=h(PIDia||PIDja||PIDs||M9/)as the session shared key,as shown in Module III.
Module III:Mutual authentication phase
Let us suppose a new drone denoted by Vjnewis required to add to the IoD environment.The control station server (CSS)initially generates a distinctive IDjanewand computes PIDjanew=h(IDjanew||s),where s is the secret key.Next,CSS chooses a 160-bits public keyl,computes:Ajnew=h(IDjanew||l)and stores{IDjanew,PIDjanew,Aj}in its memory and{PIDjanew,Aj}in drone’s memory.The operator sitting on CSS informs all the previously registered drones from the newly added drone available on IoD for dynamic changing of its topology and deploy for the possible task.
If a legitimate user desires to change his/her password or biometrics, our protocol offers changing facilities to him/her freely and securely.To do so, the user first enters his/her old identity IDia, old password PWia, and imprint biometric BIO/ia; and computes:σ/ia=Rep(BIO/ia,τia), Aim=h(IDia||PWia)⊕Ai, PIDiam=h(IDia||PWia)⊕PIDia, generates R1∈Z*nand computes M1/= h(PIDs||R1)⊕PIDia.If M1/?=M1, tells the user to fresh password PWianew, or re-imprints biometrics BIOianew, Locally the computations performed as: PIDia=h(IDia||s), Ai=h(PWianew||l),Gen(BIOianew)=(σianew,τianew), Ainew=h(IDia||PWianew)⊕Ai, PIDianew=h(IDia||PWianew)⊕PIDiaand replaces{Aim,PIDiam}with{Ainew,PIDianew},as shown in Module IV.
Module IV:Password/Biometric change phase
If a drone goes out of service or is physically captured by an attacker or taken down/crashed,its data is available in the CSS poses a severe threat.This can, in turn, be used by the unauthorized entity,which means the danger of IoD.Therefore,we suggested that the CSS have a list/database table consisting of unique identities of compromised drones.Personal values can be added and removed from the record correspondingly,i.e.,Aja=IDja||s,Ajadel=IDja||s,IDja?=IDjadel,if it confirms,delete IDjadeland completely remove the record of such drone from the CSS.
Security analysis for any protocol is considered an essential task.Because security analysis uses system engineering ideas and trust to scrutinize and examine the strength of a cryptographic-based designed protocol,this section identifies the protocol’s credibility,authenticates the IoD environment protocol’s stability, shared authentication, and integrity.The protocol mentioned above analyzed formally using BAN Logic[34]and,ProVerif2.02[35],which are as under:
The formal security analysis of the proposed authentication protocol will be conducted using the following different methods used by different researchers from time to time like using BAN Logic[34]and,ProVerif2.02[35],are as under:
5.1.1 BAN Logic
Before analyzing the proposed protocol using BAN logic [34], let’s, define a few concepts and different notation defined are shown in Tab.2,below:
Table 2: BAN logic notations and its description
Different rules defined are as under:
Rule 1:Message Meaning
If Uiabelieves that Uiaand CSS share SK sees message X,then Uiabelieves CSS once said.
Rule 2:Nonce Verification
If Uiabelieves that message X is fresh that CSS once said X,then Uiabelieves that CSS trust X
Rule 3:Jurisdiction Rule
If Vjabelieves CSS control X because it is under the jurisdiction of both and Vjabelieves that CSS believes X,then Vja believes X.
Rule 4:Freshness Rule
If Vjabelieves that message X is fresh,and CSS believes X,then Vjabelieves they sharedkey.
Rule 5:Belief Rule
If Uiabelieves that X,then CSS believe in message X and Vja
1)Goals
The following goals are demonstrated for the proposed authentication protocol.
2)Idealized Form
The following idealized form is as a result of this described for the proposed authentication scheme:
3)Assumption
The following assumptions will prove our protocol:
4)Proof
Now to verify each statement,take message1,and assumption 2,i.e.,
Therefore,from this proof,it has been cleared that the keys exchanges between the user,control station server(CSS),and the drone are fully authenticated by each peer,and no one can compromise its integrity at any stage during communication.
5.1.2 ProVerif2.02 Simulation
To check the proposed protocol’s security, a verification software toolkit [35] is now used to confirm its reachability and authorization.The coding is explained in different parts as given as:
SIMULATION RESULT
Suppose an adversary has full power by entering the open channel for eavesdropping, altering,deleting,or updating the message exchange between participants.Then how the proposed authentication protocol can resist such known flaws[36].We will discuss such suppositions one by one here in this section of the paper.
5.2.1 Resists Privileged Insider Attack
Firstly, the control station server (CSS)chooses a big random number l of 160-bits, and a 160-bits secrete number s, collision-free one-way hash function h(.): {0, 1}*∈Zq* and public parameters pms.Secondly, messages exchanged between Uia→CSS, CSS →V-jaand Vja→Uia, i.e., {M1, M2,M3,M4,ST1},{M5,M6,M7,ST2}and{M8,M9,M10,ST3}are in encrypted form in which an insider(let be a privileged one)cannot figure out the internal credentials.Because l is used for encryption,s for decryption purposes and insiders cannot identify anything from it.Also, the exchange among participants is entirely unreadable,so he/she failed to identify the identity or password from the stored information.Therefore,the proposed protocol shows resistance to privileged insider attacks.
5.2.2 Stolen Verifier Attack
Suppose an adversary steals the information from the shared memory and tries to compute identity and other information.Due to exchanging of random numbers R1, R1/, R2, R1//on each communication, the attacker failed to do so.Similarly, it is hard for him/her to find the big 160-bits random numbers,as these numbers are linked with IDia,IDja,IDs,PIDia,PIDja,PIDs,biometric(BIOia),and password(PWia).Therefore,the proposed protocol resists stolen verifier attacks.
5.2.3 Replay Attack
Let suppose if an attacker copies message{M1,M2,M3,M4,ST1}from a communication channel and desires to replay it at some other time.At this stage,due to the involvement of random numbers and timestamps, the system can quickly identify the replay message and discards such request.The attacker can do the same also for other messages, i.e., {M5, M6, M7, ST2} and {M8, M-9, M10, ST3}.Therefore,the proposed authentication protocol shows resilience to replay attacks.
5.2.4 Untraceability
The drone or user starts each session with different session keys;let us suppose,if an adversary can record the session of a user/drone and tries to record another session at some other time,he/she may find a different session key.We can say that the adversary cannot figure out the same credentials from these session keys for which he/she can identify the exact location or trace user/drone.Therefore,the proposed authentication scheme is untraceable.
5.2.5 Anonymity
Due to the dynamic identities,random numbers,and timestamps,each time a message transmission over a public channel can be performed dynamically.If an adversary desires to copy one message in TAand another message from the same line on time TA/, he/she cannot identify the surrounding of a user/drone because different messages are communicated between the participants each time.Therefore,the proposed protocol preserves anonymity security features.
5.2.6 DoS Attack
If an adversary copy {M5, M6, M7, ST2} and chooses timestamp STAand the CSS passed Tc-STA≤ΔT, computes PIDia/=M1⊕h(PIDs||STA), retrieves Ai/and calculates R1/=M2⊕h(PIDia/||PIDs||Ai/),PIDja/=M3⊕h (PIDia/||PIDs||Ai/||R1/)and M4/=h(PIDia/||PIDja/||PIDs||Ai/||R1/).Next server has to match M4/?=M4, which is not possible.So, in such situations, the process is terminated and stops further computations.Similarly,if an adversary selects TA,catch message{M8,M-9,M10,STA}and transmits it towards drone(Vja).Next drone suppose can successfully perform Tc-STA≤ΔT and computes R1//=M5⊕h(PIDja||Aj),PIDia//=M6⊕h(PIDja||PIDs||Aj||R1//),and M7/=h(PIDia//||PIDja||PIDs||Aj||R1//).Now, check M7/with M7and if not match then the connection will terminate.Therefore,the proposed protocol is strong against DoS attack.
5.2.7 Drone Capture Attack
Due to unique credentials stored in the memory of a remote drone and distinct session key established among drone, user, and CSS in the network, attackers at any stage cannot capture or divert a drone towards itself.Therefore, the proposed protocol resists drone captures attacks.Similarly,a drone might be required to engage in dangerous situations where it is abandoned during military mission delivery, making it vulnerable to physical capture and traditional cyber threats.An adversary uses white-box attack capabilities to completely control the internal credentials, figure outing identity,and execute the cryptography modules in static and dynamic ways,including all sidechannel information.Therefore,the proposed protocol had guaranteed not to disclose any parameters when someone takedown/captured a drone physically.
5.2.8 Resists Side-Channel Attack
Due to being less dependent on fundamental values, confirmation of values at different stages of the protocol, and computing the session shared key randomly for each session which leads to the sequence of operations changing,can generally make the proposed protocol better to resist sidechannel attack.
In this section,the performance analysis/evaluation of the proposed authentication protocol can be performed from the perspective of storage overheads,computation,and communication costs by keeping the already experiment conducted by[37],which are as under:
The storage overheads mean the parameters stored during the registration phase of the proposed scheme.In this regard,IDia,IDja,IDs,and PWiaare stored in 64 bits,each of a total sum of 256 bits in memory space.Biometric keys(σia,τia)are in 128-bit space;timestamp takes 56 bits space,R1,R1/,R1//,R2needs 160+160+160+160=640 bits,l,andsneeds 320 bits space.Encryption/Decryption functions require every 192 bits,a total sum of 384 bits.Therefore,the storage overheads cost of the proposed authentication protocol is 1784 bits.
The computation cost can be analyzed by keeping in view the experiment done by[37].According to [24], during the selection of a random numbers the CPU consume 0.539 ms (total random numbers 6 (6×0539=3.234 ms)), public-key encryption 3.8500 ms (3×3.8500=11.55 ms), decryption 3.8500 ms (3×3.8500=11.55 ms), hashing 0.0023 ms (24×0.0023=0.0552 ms), multiplication 2.226 ms(2×2.226=4.452 ms),and addition 0.0288 ms(11×0.0288=0.3168 ms).The estimated cost for hash-based message authentication is 0.0056 ms.Therefore, the final computation cost for the proposed authentication scheme is 31.158 ms.
Table 3: Comparison analysis
Based on[37],the messages exchanged among all the participants over the public network channel can be considered communication costs.The communication cost for the first message is 1080bits({M1,M2, M3, M4, ST1}=256+256+256+256+56=1080 bits), second and 3rdare 824 each ({M5, M6,M7, ST2}=256+256+256+56=824 bits, {M8, M9, M10, ST3}=256+256+256+56=824 bits).Therefore,the total communication costs for the proposed authentication protocol are 2728 bits.
Comparing the proposed authentication protocol with state of the art protocols like Challa et al.[20],Seo et al.[26],Farash et al.[27],and Zhang et al.[14],the communication cost is slightly higher than [26], but it is much better in computation cost.The results are shown in Tab.3, followed by a graph in Fig.3.
Figure 3:Comparison Chart with state-of-the-art protocols
Furthermore,the various sections in Tab.4 represent the comparison of the proposed solutions with different security functionalities as given in Challa et al.[20],Seo et al.[26],Farash et al.[27],and Zhang et al.[14].For example,in Tab.4,I represent the Physical Security of the Drone,II represents its security against Impersonation attack, III shows resistance to location threat, IV represents safe against stolen verifier attack,and V represents secure privileged insider threat.
Table 4: Functionalities comparison analysis
The widespread usage of IoD technology and the non-availability of foolproof secure authentication protocols for the IoD environment motivates us to design a mutual authentication and crossverification protocol.The current research work deeply examined different protocols available in the literature and highlighted the various flaws in Zhang et al.protocol.We then presented a PKI,XOR,and simple hash function-based protocol used for checksum at both ends.This cyclic checksum of hash functions has the capability of less storage and high security.Its performance is better than any other method because it allows mutual processing of public network channels between Drone-CSS, CSSDrones, User-Drone, and CSS-Drone without loss of security.The proposed scenario’s security has been verified formally using BAN logic of authentication.While the key secrecy,confidentiality,and reachability have been verified using the ProVerif2.02 toolkit.Moreover, the strength of the scheme has been discussed pragmatically in the informal analysis section of the paper.At the end of the article, the performance analysis section has been completed by considering three metrics storage,communication,and computation costs.Upon comparing the proposed scheme with state-of-the-art protocol, it has been shown that it is efficient and effective and can be recommended for practical implementation in the IoD environment.
Acknowledgement:The authors would like to express their sincere thanks to the University of Bisha,Bisha,Saudi Arabia,for the support provided during the research.
Funding Statement:No funding has been received for conducting this research.
Conflicts of Interest:The authors declared that they have no conflict of interest.
Computers Materials&Continua2022年9期