A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentic...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9393888/ |
_version_ | 1818970836153925632 |
---|---|
author | Yuan Lei Lining Zeng Yan-Xing Li Mei-Xia Wang Haisheng Qin |
author_facet | Yuan Lei Lining Zeng Yan-Xing Li Mei-Xia Wang Haisheng Qin |
author_sort | Yuan Lei |
collection | DOAJ |
description | The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security. |
first_indexed | 2024-12-20T14:42:48Z |
format | Article |
id | doaj.art-d1dd338037a74f39a7c53dc6a7b471c6 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-20T14:42:48Z |
publishDate | 2021-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-d1dd338037a74f39a7c53dc6a7b471c62022-12-21T19:37:13ZengIEEEIEEE Access2169-35362021-01-019537695378510.1109/ACCESS.2021.30706839393888A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource OptimizationYuan Lei0https://orcid.org/0000-0003-3714-5177Lining Zeng1https://orcid.org/0000-0002-4196-3319Yan-Xing Li2Mei-Xia Wang3Haisheng Qin4School of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaSchool of Business Administration, Hunan University of Finance and Economics, Changsha, ChinaSchool of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaSchool of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaSchool of Information and Engineering, Guangxi University of Foreign Languages, Nanning, ChinaThe widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an optimized lightweight identity security authentication protocol, Optimized Identity Authentication Protocol (ODIAP) is proposed for Internet of Drones (IoD) networks. The protocol is targeted to the security risks faced by IoD networks, and proposes the security authentication mechanism consisting of 3 phases and 7 authentication processes, which enables the protocol has both forward and backward security, and can resist mainstream network attacks. Meanwhile, this paper fully considers the computational load and proposes the identity information generation and verification method based on the Chinese residual theorem, which reduces the computational load of resource-constrained nodes and shifts the complex computational process to server nodes with abundant computational resources. Moreover, after security protocol analysis and tool verification based on the automated security verification tool Proverif, the protocol in this paper has complete security. At the same time, the performance analysis and comparison with other mainstream protocols shows that this protocol effectively optimizes the use of computing resources without compromising security.https://ieeexplore.ieee.org/document/9393888/UAVInternet of Droneslightweight authenticationProverifsecurity |
spellingShingle | Yuan Lei Lining Zeng Yan-Xing Li Mei-Xia Wang Haisheng Qin A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization IEEE Access UAV Internet of Drones lightweight authentication Proverif security |
title | A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization |
title_full | A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization |
title_fullStr | A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization |
title_full_unstemmed | A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization |
title_short | A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization |
title_sort | lightweight authentication protocol for uav networks based on security and computational resource optimization |
topic | UAV Internet of Drones lightweight authentication Proverif security |
url | https://ieeexplore.ieee.org/document/9393888/ |
work_keys_str_mv | AT yuanlei alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT liningzeng alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT yanxingli alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT meixiawang alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT haishengqin alightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT yuanlei lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT liningzeng lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT yanxingli lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT meixiawang lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization AT haishengqin lightweightauthenticationprotocolforuavnetworksbasedonsecurityandcomputationalresourceoptimization |