A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentic...

Full description

Bibliographic Details
Main Authors: Yuan Lei, Lining Zeng, Yan-Xing Li, Mei-Xia Wang, Haisheng Qin
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9393888/
_version_ 1818970836153925632
author Yuan Lei
Lining Zeng
Yan-Xing Li
Mei-Xia Wang
Haisheng Qin
author_facet Yuan Lei
Lining Zeng
Yan-Xing Li
Mei-Xia Wang
Haisheng Qin
author_sort Yuan Lei
collection DOAJ
description The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security.
first_indexed 2024-12-20T14:42:48Z
format Article
id doaj.art-d1dd338037a74f39a7c53dc6a7b471c6
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T14:42:48Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-d1dd338037a74f39a7c53dc6a7b471c62022-12-21T19:37:13ZengIEEEIEEE Access2169-35362021-01-019537695378510.1109/ACCESS.2021.30706839393888A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource OptimizationYuan Lei0https://orcid.org/0000-0003-3714-5177Lining Zeng1https://orcid.org/0000-0002-4196-3319Yan-Xing Li2Mei-Xia Wang3Haisheng Qin4School of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaSchool of Business Administration, Hunan University of Finance and Economics, Changsha, ChinaSchool of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaSchool of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaSchool of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaThe widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security.https://ieeexplore.ieee.org/document/9393888/UAVInternet of Droneslightweight authenticationProverifsecurity
spellingShingle Yuan Lei
Lining Zeng
Yan-Xing Li
Mei-Xia Wang
Haisheng Qin
A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
IEEE Access
UAV
Internet of Drones
lightweight authentication
Proverif
security
title A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
title_full A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
title_fullStr A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
title_full_unstemmed A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
title_short A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
title_sort lightweight authentication protocol for uav networks based on security and computational resource optimization
topic UAV
Internet of Drones
lightweight authentication
Proverif
security
url https://ieeexplore.ieee.org/document/9393888/
work_keys_str_mv AT yuanlei alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT liningzeng alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT yanxingli alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT meixiawang alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT haishengqin alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT yuanlei lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT liningzeng lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT yanxingli lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT meixiawang lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization
AT haishengqin lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization