An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones
Abstract
:1. Introduction
- We propose an authentication scheme that employs blockchain as a Certificate Authority (CA) and a transaction as a certificate to reduce high maintenance costs.
- The proposed scheme is based on the concept of Hyperelliptic Curve Cryptography (HECC), an improved form of Elliptic Curve Cryptography (ECC), which offers the same level of security as ECC, RSA, and BP with a smaller key size.
- Security analysis studies, such as formal security analysis, demonstrate that the proposed scheme is resistant to a variety of active and passive attacks by indicating that the scheme can withstand these types of attacks.
- The proposed scheme is then compared with the similar existing schemes and results show that the proposed scheme is efficient in terms of computation and communication costs.
2. Literature Review
Schemes | Year | Environment | Techniques | Limitations |
---|---|---|---|---|
Wazid et al. [23] | 2019 | IoD |
|
|
Tian et al. [26] | 2019 | IoD |
|
|
Ali et al. [27] | 2020 | IoD |
|
|
Bera et al. [31] | 2020 | IoT/IoD |
|
|
Chaudhry et al. [32] | 2021 | IoD |
|
|
Bera et al. [33] | 2022 | IoT/IoD |
|
|
3. Network Model and Construction of the Proposed Scheme
3.1. Network Model
3.2. Construction of the Proposed Scheme
- Select the hyper elliptic curve and the genus ().
- The devisor of hyper elliptic curve with a maximum size of 80 bits.
- A finite field of hyper elliptic curve of order .
- The two hash functions and that belongs to SHA family with sizes of 256 bits.
- The parameter that will be accessible publicly.
- chooses and computes .
- sets as its private key and calculates as its public key
- chooses and computes .
- sets as its private key and calculates as its public key.
- Compute and set , where and .
- Compute and .
- It picks and computes .
- It sets and computes .
- Computes and encrypt the private part of a data as )
- Computes ), note we have divided the data into two parts, i.e., represent the private part and denotes that this data will be publicly available for the drones devices.
- Computes and return (,).
- Finally, broadcasts (,) in a blockchain.
- can obtain (,) from blockchain and compute
- Computes and .
- Computes and checks if , then it will be a public key of , and it will pass the authentication process and set () as a secret key.
- chooses and computes .
- sets as his private key and calculates as his public key.
- Compute and set , where and .
- Compute and .
4. Provable Security Analysis
- It picks and computes .
- It sets and computes .
- It computes , where it is taken from and ).
- It computes ), where it is taken from.
- It computes and returns (,).
- Compute
- Compute and
- Compute and check if , then return .
- It picks and compute .
- It sets and compute .
- Compute , where it is taken from and ).
- Compute ), where it is taken from.
- Compute and return (,).
- Compute
- Compute and
- Compute and check if , then return .
5. Performance Analysis
5.1. Computation Cost
5.2. Communication Overhead
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Khan, M.A.; Shah, H.; Rehman, S.; Kumar, N.; Ghazali, R.; Shehzad, D.; Ullah, I. Securing Internet of Drones with Identity-Based Proxy Signcryption. IEEE Access 2021, 9, 89133–89142. [Google Scholar] [CrossRef]
- Restás, Á. Drone Applications Fighting COVID-19 Pandemic—Towards Good Practices. Drones 2022, 6, 15. [Google Scholar] [CrossRef]
- Labib, N.S.; Brust, M.S.; Danoy, G.; Bouvry, P. The Rise of Drones in Internet of Things: A Survey on the Evolution, Prospects and Challenges of Unmanned Aerial Vehicles. IEEE Access 2021, 9, 115466–115487. [Google Scholar] [CrossRef]
- Abualigah, L.; Diabat, A.; Sumari, P.; Gandomi, A.H. Applications, Deployments, and Integration of Internet of Drones (IoD): A Review. IEEE Sens. J. 2021, 21, 25532–25546. [Google Scholar] [CrossRef]
- Vergouw, B.; Nagel, H.; Bondt, G.; Custers, B. Drone Technology: Types, Payloads, Applications, Frequency Spectrum Issues and Future Developments. In The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives; Custers, B., Ed.; T.M.C. Asser Press: Hague, The Netherlands, 2016; pp. 21–45. [Google Scholar]
- Gharibi, M.; Boutaba, R.; Waslander, S.L. Internet of Drones. IEEE Access 2016, 4, 1148–1162. [Google Scholar] [CrossRef]
- Sharma, V.; Choudhary, G.; Ko, Y.; You, I. Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT). IEEE Access 2018, 6, 43368–43383. [Google Scholar] [CrossRef]
- Noor, F.; Khan, M.A.; Al-Zahrani, A.; Ullah, I.; Al-Dhlan, K.A. A Review on Communications Perspective of Flying Ad-Hoc Networks: Key Enabling Wireless Technologies, Applications, Challenges and Open Research Topics. Drones 2020, 4, 65. [Google Scholar] [CrossRef]
- Choudhary, G.; Sharma, V.; Gupta, T.; Kim, J.; You, I. Internet of drones (IoD): Threats vulnerability and security perspectives. arXiv 2018, arXiv:1808.00203. [Google Scholar]
- Abdelmaboud, A. The Internet of Drones: Requirements, Taxonomy, Recent Advances, and Challenges of Research Trends. Sensors 2021, 21, 5718. [Google Scholar] [CrossRef]
- Hu, J.; Chen, C.; Cai, L.; Khosravi, M.R.; Pei, Q.; Wan, S. UAV-Assisted Vehicular Edge Computing for the 6G Internet of Vehicles: Architecture, Intelligence, and Challenges. IEEE Commun. Stand. Mag. 2021, 5, 12–18. [Google Scholar] [CrossRef]
- Mohsan, S.A.H.; Khan, M.A.; Noor, F.; Ullah, I.; Alsharif, M.H. Towards the Unmanned Aerial Vehicles (UAVs): A Comprehensive Review. Drones 2022, 6, 147. [Google Scholar] [CrossRef]
- Khan, M.A.; Ullah, I.; Alsharif, M.H.; Alghtani, A.H.; Aly, A.A.; Chen, C.M. An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones. Secur. Commun. Netw. 2022, 2022, 9718580. [Google Scholar] [CrossRef]
- Khan, M.A.; Alzahrani, B.A.; Barnawi, A.; Al-Barakati, A.; Irshad, A.; Chaudhry, S.A. A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network. Ocean. Eng. 2022, 250, 110894. [Google Scholar] [CrossRef]
- Tanveer, M.; Khan, A.U.H.; Shah, S.A. Chaudhry and A. Naushad, "PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones. IEEE Access 2021, 9, 145683–145698. [Google Scholar] [CrossRef]
- Hussain, S.; Chaudhry, S.A.; Alomari, O.A.; Alsharif, M.H.; Khan, M.K.; Kumar, N. Amassing the security: An ECC-based authentication scheme for Internet of drones. IEEE Syst. J. 2021, 15, 4431–4438. [Google Scholar] [CrossRef]
- Zhang, Y.; He, D.; Li, L.; Chen, B. A lightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 2020, 154, 455–464. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Irshad, A.; Khan, M.A.; Khan, S.A.; Nosheen, S.; AlZubi, A.A.; Zikria, Y.B. A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System. IEEE Trans. Intell. Transp. Syst. 2021, 1–10. [Google Scholar] [CrossRef]
- Liu, P.; He, H.; Fu, T.; Lu, H.; Alelaiwi, A.; Wasi, M.W.I. Task offloading optimization of cruising UAV with fixed trajectory. Comput. Netw. 2021, 199, 108397. [Google Scholar] [CrossRef]
- Chen, T.-H.; Zhu, T.-L.; Jeng, F.-G.; Wang, C.-L. Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains. Secur. Commun. Netw. 2021, 2021, 6637402. [Google Scholar] [CrossRef]
- Liang, X.; Zhao, J.; Shetty, S.; Li, D. Towards Data Assurance and Resilience in IOT using Blockchain. In Proceedings of the IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; pp. 261–266. [Google Scholar]
- Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 2018, 56, 64–69. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 2019, 6, 3572–3584. [Google Scholar] [CrossRef]
- Aggarwal, S.; Shojafar, M.; Kumar, N.; Conti, M. A new secure data dissemination model in Internet of drones. In Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- García-Magarin´o, I.; Lacuesta, R.; Rajarajan, M.; Lloret, J. Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad. Hoc. Netw. 2019, 86, 72–82. [Google Scholar] [CrossRef]
- Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of drones. J. Inf. Secur. Appl. 2019, 48, 102354. [Google Scholar] [CrossRef]
- Ali, Z.; Chaudhry, S.A.; Ramzan, M.S.; Al-Turjman, F. Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles. IEEE Access 2020, 8, 43711–43724. [Google Scholar] [CrossRef]
- Khalid, U.; Asim, M.; Baker, T.; Hung, P.C.K.; Tariq, M.K.; Rafferty, L. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Comput. 2020, 23, 2067–2087. [Google Scholar] [CrossRef]
- Nikooghadam, M.; Amintoosi, H.; Hafiz-ul-Islam, S.K.; Moghadam, M.F. A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. J. Syst. Archit. 2021, 115, 101955. [Google Scholar] [CrossRef]
- Ch, R.; Srivastava, G.; Gadekallu, T.R.; Maddikunta, P.K.R.; Bhattacharya, S. Security and privacy of UAV data using blockchain technology. J. Inf. Secur. Appl. 2020, 55, 102670. [Google Scholar] [CrossRef]
- Bera, D.; Chattaraj, D.; Das, A.K. Designing Secure Blockchain-Based Access Control Scheme in IoT-Enabled Internet of Drones Deployment. Comput. Commun. 2020, 153, 229–249. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Yahya, K.; Karuppiah, M.; Kharel, R.; Bashir, A.K.; Zikria, Y.B. GCACS-IoD: A certificate based generic access control scheme for Internet of Drones. Comput. Netw. 2021, 191, 107999. [Google Scholar] [CrossRef]
- Bera, B.; Vangala, A.; Das, A.K.; Lorenz, P.; Khan, M.K. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput. Stand. Interfaces 2022, 80, 103567. [Google Scholar] [CrossRef]
- Tan, Y.; Wang, J.; Liu, J.; Kato, N. Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles. IEEE Internet Things J. 2022, 9, 16928–16940. [Google Scholar] [CrossRef]
- Das, A.K.; Bera, B.; Wazid, M.; Jamal, S.S.; Park, Y. iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment. IEEE Access 2021, 9, 87024. [Google Scholar] [CrossRef]
S.No | Symbol | Description |
---|---|---|
1 | Used for sending drone | |
2 | Used for receiving drone | |
3 | Used for public key of sending drone | |
4 | Used for private key of sending drone | |
5 | Used for public key of receiving drone | |
6 | Used for private key of receiving drone | |
7 | Used for receiving drone’s transaction | |
8 | Represents transaction data | |
9 | Used for hyper elliptic curve divisor multiplication operation | |
10 | Used for hyper elliptic curve divisor addition operation | |
11 | Used for elliptic curve point multiplication operation | |
12 | Used for elliptic curve point addition operation | |
13 | Used for hash function operation | |
14 | Used for hyper elliptic curve parameter size | |
15 | Used for elliptic curve identity size | |
16 | Used for elliptic curve time stamp size | |
17 | Used for elliptic curve parameter size | |
18 | Used for hash value size |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Javed, S.; Khan, M.A.; Abdullah, A.M.; Alsirhani, A.; Alomari, A.; Noor, F.; Ullah, I. An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones. Drones 2022, 6, 264. https://doi.org/10.3390/drones6100264
Javed S, Khan MA, Abdullah AM, Alsirhani A, Alomari A, Noor F, Ullah I. An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones. Drones. 2022; 6(10):264. https://doi.org/10.3390/drones6100264
Chicago/Turabian StyleJaved, Sana, Muhammad Asghar Khan, Ako Muhammad Abdullah, Amjad Alsirhani, Abdullah Alomari, Fazal Noor, and Insaf Ullah. 2022. "An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones" Drones 6, no. 10: 264. https://doi.org/10.3390/drones6100264
APA StyleJaved, S., Khan, M. A., Abdullah, A. M., Alsirhani, A., Alomari, A., Noor, F., & Ullah, I. (2022). An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones. Drones, 6(10), 264. https://doi.org/10.3390/drones6100264