Abstract
Recently, drones have gained significant importance in various fields, such as military applications, healthcare, smart agriculture, and traffic monitoring. Equipped with embedded systems capable of sensing, collecting, and transmitting data in real time via public communication channels, drones enable the flow of confidential and sensitive information into cyberspace. However, this poses a risk of data being compromised during transmission over unsecured public channels. To mitigate such risks, many mutual authentication schemes have been proposed. Nevertheless, existing solutions still face security and performance limitations. In response, we propose the design of two lightweight and secure remote user authentication protocols and a key agreement for the Internet of Drones (IoD) environment. The first protocol, P-I, allows users and drones to mutually authenticate each other, establishing a secure and reliable connection. The second protocol, P-II, serves to re-authenticate authorized users, achieving a balance between security and performance. Both protocols utilize hash functions to enhance security and efficiency. We analyze the proposed protocols and conduct an informal security analysis and performance evaluation, focusing on security features, computational overhead, and communication efficiency. Our findings demonstrate that the proposed protocols outperform existing solutions by meeting all security requirements, achieving effective re-authentication, resisting both active and passive attacks, and providing suitable performance for IoD environments.
| Original language | English |
|---|---|
| Article number | e3399 |
| Journal | PeerJ Computer Science |
| Volume | 12 |
| DOIs | |
| State | Published - 2026 |
Keywords
- Attack
- Drones
- Internet of drones
- Mobile edge computing
- Mutual authentication
- Security
- Session key agreement
Fingerprint
Dive into the research topics of 'Design of a lightweight and secure remote user authentication and key agreement protocols for internet of drones environment'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver