Next Article in Journal
Communications and Data Science for the Success of Vehicle-to-Grid Technologies: Current State and Future Trends
Previous Article in Journal
Detection of False Data Injection Attacks on Smart Grids Based on A-BiTG Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles

1
Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
2
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
3
School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(10), 1939; https://doi.org/10.3390/electronics13101939
Submission received: 19 March 2024 / Revised: 5 May 2024 / Accepted: 14 May 2024 / Published: 15 May 2024
(This article belongs to the Special Issue Cryptography in Network Security)

Abstract

:
The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with access control are employed. These schemes ensure that only specific rescue vehicle operators acting within a valid period can achieve mutual authentication from a designated processor, while access for mismatched, revoked, or expired users is denied. However, the current alternatives fail to ensure session key forward secrecy, entities’ mutual authentication, and user anonymity, thereby compromising users’ privacy and the security of communications. Moreover, executing too many time-consuming operations on vehicles’ resource-constrained devices inevitably degrades the performance of the authentication protocol. Balancing security and performance in the design of an authentication protocol with access control presents a significant challenge. To address this, a more efficient and robust authentication with access control has been designed. The proposed protocol ensures user anonymity through dynamic pseudonym allocation, achieves forward secrecy by excluding the long-term key from session key generation, and obtains mutual authentication by verifying the integrity of the messages exchanged. According to the security and performance analysis, it is demonstrated that the proposal is a robust, efficient, and cost-effective solution. In particular, the proposal can reduce the computational overhead by 66% compared to recent alternatives.

1. Introduction

Originally utilized for military purposes, drones—or unmanned aerial vehicles—are anticipated to become integral to the Internet of Vehicles (IoV), leveraging their capabilities for three-dimensional movement, high maneuverability, autonomous operation, and communication processing [1]. In remote mountainous regions, the traditional communication infrastructure fails to support timely data transmission for the IoV, particularly during critical periods such as vehicle accidents [2].
In the traffic accident rescue scenario of the DIoV, shown in Figure 1, the drone of the command center, serving as a drone gateway, provides prompt and sustainable services to facilitate accident investigations, and it allows the different departments in urban areas to quickly dispatch their own rescue vehicles to offer accident and emergency services (e.g., fire and medical services and road traffic accident clearing).
However, malicious entities illegally accessing and potentially disrupting the transmitted data pose a significant safety hazard that cannot be overlooked in traffic accident rescue scenarios [3,4]. The technologies of multi-factor authentication (involving a password, a smart card and other factors) and key agreement [5,6] can be used to protect the transmitted data from unauthorized access or disruption. Upon mutual authentication, tunnels are built among rescue vehicles’ users and the processor, and a session key will be established for secure communication [7,8].
Furthermore, an issue arises regarding how to provide specific rescue vehicles with legal access to particular data within a valid period, highlighting the need for fine-grained access control [9]. In this type of scheme, depending on the type and responsibilities of the rescue vehicle, only a specific rescue vehicle’s user is allowed to obtain mutual authentication from a designated processor, while other users that are mismatched, revoked, or overdue are not entitled to certification. As shown in Figure 1, the processors (PS), which include the fire rescue processor, medical processor and road traffic accident clearing processor, can only interact with their respective rescue vehicles to ensure secure and accurate emergency services.
Existing authentication schemes with access control [10,11,12,13,14,15,16], however, fail to ensure the security of the session key and the privacy of the user [17]. Moreover, the large number of operations consumes vast amounts of storage, bandwidth and computational power, which drains the capacity of energy-limited vehicle networking devices such as vehicles’ processors. Addressing the design of a more efficient and robust authentication scheme with access control, a new scheme for DIoV is studied in this paper, in which four key points are considered, as listed below.
Firstly, by defining the control policy and obeying the mechanism in which the message is delivered first, received later and verified last, the proposed scheme can meet the requirement that any rescue vehicle’s user can only obtain authentication and negotiate the session key from the specified processor within the validity period. It is noted that the communication entities must verify one another’s identities to satisfy mutual authentication. Alternative schemes [10,12,13,15] do not adhere to this important principle since there is a lack of authentication whereby the message receiver (i.e., the user) verifies the identity of the message sender (i.e., the DG).
Secondly, during the registration phase, the user in the rescue vehicle is free to select a password; however, there is no password verification table stored in the drone as a relay node, which can eliminate the risk of password exposure. Moreover, via the “mod” operation, the system can resist smart card loss attacks and password guessing attacks [18,19].
Thirdly, in the authentication phase, the user interacts with the DG by using a pseudonym. Note, that the dynamic of a pseudonym preserves the user’s anonymity. Additionally, regarding the session key of the user and processor, the long-term key of the DG is no longer used to compute the session key, so the session key adheres to forward secrecy.
Lastly, from the perspective of performance in terms of storage, communication and computational costs, the designed scheme can minimize these costs as much as possible in the energy-limited DIoV.
The remainder of this paper is organized as follows. Section 2 describes the related works, and then the designed scheme is shown in Section 3. In Section 4, the security analysis is provided, and the performance analysis of the proposed scheme is shown in Section 5. Finally, Section 6 gives a brief conclusion and highlights the ongoing research work.

2. Related Works

Initially, Das [20] introduced a two-factor authentication protocol incorporating both a password and a smart card to secure communications within wireless sensor networks (WSNs). Additionally, the European Union’s General Data Protection Regulation (GDPR) has been implemented to enhance the security and privacy of vehicle accident data [9]. It is thus necessary to design authentication protocols with access control for the DIoV.
Our examination of existing research on the DIoV reveals a lack of protocols incorporating access control specifically designed for the DIoV. Specifically, there are mainly works that enable the vehicle’s authentication with a trusted authority [21,22] and decentralized blockchain platform [23], which is similar to an ordinary authentication scenario in the IoT [18,24,25]. Other studies consider the vehicles’ batch authentication by using signature fusion technology [26] and cross-domain authentication based on a two-way synchronization database mechanism [27]. Moreover, in the field of smart healthcare, some research works on authentication with access control can be found.
Utilizing the Chinese Remainder Theorem (CRT), Srinivas et al. [10] proposed a secure user authentication and access control scheme within a Cloud-of-Things-centric (CoTC) environment, specifically for wearable device monitoring systems. A notable observation is that, for forward secrecy, in their scheme, the long-term key does not need to be involved in constructing the session key. However, it is clear that significantly more storage resources would be consumed in their scheme and that no mutual authentication exists between the CoTC and sensor nodes.
Subsequently, Ref. [11] introduced an e-health-oriented scheme that integrates authentication, key agreement and access control guided by a control string specified by the medical server. Furthermore, they were the first to propose a method to transfer the ownership of patient information from the former physician to a new one, in order to allow more effective medical treatment. However, note that this scheme does not satisfy forward secrecy, or three-factor security and is not resistant to the inevitable type-l node capture attack [17].
In 2019, Banerjee et al. [12] introduced a method for time-limited user authentication and access control, whereby access privileges are automatically revoked upon the expiration of the allocated authentication period. In [12], ensuring the integrity and security of passwords is identified as a fundamental criterion, necessitating the development of a more robust authentication framework.
In the following year, after cryptanalyzing the developed scheme in [12] regarding its security flaws, such as its susceptibility to smart card loss attacks and stolen verifier attacks, Kumar et al. [13] provided an improved scheme that could effectively preserve users’ privacy (anonymity and password security). Nonetheless, the issues of forward secrecy and vulnerability to type-I node capture attacks remain concerns regarding the session key’s security.
Furthermore, Alzahrani et al. [14] found that the scheme in [12] cannot complete the authentication between the user and sensor node. To address the design flaw in [12], an improved scheme, ILAS-IoT, was presented in which, with the help of a gateway node, the user and a sensing device can complete the authentication phase. However, the security flaws (i.e., the failure to provide forward secrecy and resist type-I node capture attacks) that were analyzed previously were alleviated with the application of the scheme in [14].
In the context of wireless medical sensor networks, Yao et al. [15] highlighted the limitations of existing authentication mechanisms, specifically architectural inefficiencies and overlooked security flaws. They recommended a multi-faceted authentication architecture addressing user–server, patient–server and user–patient authentication. Nevertheless, the method’s resistance to password-guessing attacks, precipitated by the password verification table, requires strengthening to prevent the disclosure of users’ passwords.
Recently, focusing on securing communications in the edge-enabled Internet of Medical Things, Seyed Ahmad Soleymani et al. [16] used digital signatures and proposed an authentication and Authenticated Key Exchange (AKE) protocol. In their scheme, the user, edge node and medical center can be authenticated mutually to generate a final session key S K = h ( r s k · R m c | | R u | | r s k · R m c ) , in which S K is determined by the values of these three entities. However, session-specific temporary information attacks (also known as ephemeral secret leakage attacks) directly threaten the integrity of S K .

3. The Proposed Scheme

In this section, we propose a three-factor user authentication and key agreement protocol for the DIoV, featuring access control mechanisms. This protocol ensures that users from rescue vehicles obtain mutual authentication exclusively from designated processors on accident vehicles, based on their department and service type. However, users from rescue vehicles who have mismatched credentials, revoked access, or expired credentials will be denied authentication by the processor. We further describe the system model of our proposed scheme below.

3.1. System Model

The system model shown in Figure 2 consists of four entities: the command center (CC), the rescue vehicle (RV), the drone gateway (DG) and the accident vehicle (AV), with a series of transaction processors ( P S j ). Further, the DG computes and then transmits messages between the RV’s user and P S j ; P S j collects certain real-time data from the accident vehicles, such as traffic transactions, medical transactions and fire transactions, enabling the users in the RVs to access real-time data to enable prompt rescue operations.
In Figure 2, we depict the secure channel transmissions (marked as ‘1’) occurring during the registration phase and the public channel transmissions (marked as ‘2’) taking place during the login and authentication phases. We then detail the authentication and key agreement process among the involved entities. Initially, the CC sets up the authentication system, generating long-term keys, secret values and public parameters. Users from rescue vehicles ( U i ) register with the CC through a secure channel, submitting registration requests and receiving a smart card from the CC. Similarly, D G and P S j submit their identities to the CC via a secure channel to obtain identity-related secret values.
During the authentication phase, U i sends a login request to the D G , which then verifies U i ’s identity and determines their eligibility for authentication with the appropriate P S j . Subsequently, the D G conveys a verification message to P S j ; upon P S j authenticating the identity of D G , it calculates and sends back a message containing a session key and authentication parameters. The D G , after verifying P S j ’s message, forwards it to U i , who then authenticates D G , extracts the key parameters and recomputes the session key.
Additionally, the definitions of some terms used in the proposed scheme are listed in Table 1.

3.2. System Setup Phase

In this phase, firstly, C C initiates an elliptic curve E ( F p ) over a prime finite field F p . Based on E ( F p ) , C C specifies an additive subgroup G with a q —order generator P, where p, q are two large primes with | q | = n , where n is a security parameter. Secondly, C C selects long-term key pair x , y F p and stores two secret values x , y temporarily, and parameters { E ( F p ) , P } are public, respectively. It is noted that in order to achieve a high security level for a long-term key pair, a 320-bit ECC can be adopted, in which the length of the secret key is 160 bits and the ECC point is 320 bits [29,30].
By running the following operations in Section 3.3, Section 3.4 and Section 3.5, the proposed scheme of authentication with access control, mutual authentication, user anonymity and forward secrecy can be achieved.
Authentication with access control: Since C C defines the control policy and DG obeys the mechanism by which the message is delivered first, received later and verified last, the proposed scheme can meet the requirement that any rescue vehicle’s user can only achieve authenticity and negotiate the session key from the specified processor within the validity period.
Mutual authentication: During authentication with access control, the communication entities must verify one another’s identities to obtain mutual authentication. However, in alternative schemes [10,12,13,15], the user does not check the identity of the DG or gateway node and so [10,12,13,15] do not satisfy the need for mutual authentication.
User anonymity: In the proposed scheme, the user uses a pseudonym provided by the CC in advance to communicate with the DG in a public channel. The pseudonym prevents the adversary from tracking the real user and thus preserves the user’s anonymity well.
Forward secrecy: During the generation of the session key, the scheme excludes the long-term key. Meanwhile, the alternative schemes [11,12,13,14] cannot achieve forward secrecy for the session key, given that the generation of their session keys relies on the long-term key.

3.3. Registration Phase

The registration phase enables the vehicle A V j and the user of R V to complete the registration of related identity information in C C ; meanwhile, the user of the rescue vehicle and A V j receive feedback from C C to prepare for future authentication with access control. Specifically, three parts constitute the registration phase: one for A V j with its processors P S j , one for user U i of R V and the last one for D G .
For the registration of some vehicle A V j , three steps are required, as described below.
(1)
A V j securely sends its identity A V I D j and a series of identifiers P S j to the C C ( A V j C C : { A V I D j , P S j } ).
(2)
C C computes and returns L T K j = h ( A V I D j | | x ) to P S j in A V j also via the secure channel ( C C P S j : { L T K j } ).
(3)
C C accumulates and lists all enrolled P S j , i.e., Δ S = { P S j } .
For the user U i of rescue vehicle R V , she/he also needs to complete the registration operation with C C .
(1)
U i chooses his/her identity, password pair ( I D i , P W i ) and a random number r and computes H P W i = h ( I D i | | P W i ) mod n 0 , A 0 = H P W i r , where n 0 = 2 8 , as an integer [24].
(2)
U i sends A 0 to C C via the secure channel ( U i C C : { A 0 } ).
(3)
Upon C C obtaining the registration request A 0 , C C records the current registration timestamp T r e g , generates a pseudonym P I D i for U i and computes L T K i = h ( P I D i | | x ) , A 1 = L T K i A 0 and E I D i = h ( P I D i | | y ) 1 · T r e g . It is noted that the output of computing h ( P I D i | | y ) is inverse in Z q * , i.e., h ( P I D i | | y ) 1 Z q * .
(4)
According to U i ’s rescue department, C C generates a credential t o k e n R V i and designates a finite time period Δ T a u t h (e.g., 2024/04–2025/04) to enable authentication and specifies the corresponding P S j set, i.e., Δ S R V i = { P S j } with an authorized polynomial f i ( t ) = h ( x | | t o k e n R V i ) + P S j Δ S R V i ( t h ( P I D i | | P S j ) ) over Z p * , where Δ S R V i Δ S .
(5)
C C encrypts { f i ( t ) , Δ T a u t h , E I D i , t o k e n R V i } and obtains ciphertexts F i ( t ) , i.e., F i ( t ) = E h ( x | | y ) [ f i ( t ) , Δ T a u t h , E I D i , t o k e n R V i ] .
(6)
C C inserts all parameters { P I D i , B K G ( · ) , A 1 , Δ S R V i , F i ( t ) , S U M } into the smart card S C i , where the parameter “ S U M ” denotes the maximum number of times that the smart card enables U i to attempt the following login phase if U i forgets the password.
(7)
C C sends the smart card S C i to U i via the secure channel ( C C U i : { S C i } ).
(8)
Upon receiving S C i , U i further inputs his/her bio-information b i o i , and then the smart card computes L T K i = A 0 A 1 , L T K i i = B K G ( b i o i ) and A 2 = h ( I D i | | P W i | | L T K i | | L T K i i | | Δ S R V i ) mod n 0 and updates A 1 = L T K i | | Δ S u H P W i .
(9)
Finally, the smart card stores < P I D i , B K G ( · ) , A 1 , A 2 , F i ( t ) , S U M > .
During D G ’s registration, it receives a key pair ( x , y ) and a set Δ S = { P S j } from C C through a secure channel. This provision is critical in facilitating subsequent authentication with access control processes.
To authenticate with a given P S j on an accident vehicle, a user from a rescue vehicle ( U i ) must undergo the following login and authentication phases. Figure 3 provides a comprehensive overview of all the steps involved in these phases to facilitate the readers’ understanding.

3.4. Login Phase

In the login phase, U i enters his/her related identity, password and bio-information into the smart card; then, this smart card verifies the real identity of U i . If this is completed, the smart card transmits U i ’s further authentication request to D G . The detailed steps are shown below.
(1)
U i inputs ( I D i * , P W i * ) and bio-information b i o i * to the smart card.
(2)
The smart card computes the following values: H P W i * = h ( I D i * | | P W i * ) mod n 0 , L T K i * | | Δ S R V i * = H P W i * A 1 , L T K i i * = B K G ( b i o i * ) , A 2 * = h ( I D i * | | P W i * | | L T K i * | | L T K i i * | | Δ S R V i * ) mod n 0 .
(3)
Then, the smart card checks whether A 2 * = A 2 holds or not, where A 2 has been stored in the smart card during the registration phase. If not, the smart card stops this session and meanwhile updates the value of S U M by adding the number 1. If S U M exceeds the maximal value, such as 3, this smart card will be suspended until U i re-registers.
(4)
Otherwise, the smart card extracts timestamp T 1 , selects random numbers r u , r u Z p * and the processor with identity P S j from Δ S R V i , which U i wishes to obtain authentication, and computes the following values: A 3 = r u · P , C 1 = h ( r u | | T 1 ) | | A 3 h ( L T K i | | T 1 ) , C 2 = Δ S R V i h ( P I D i | | h ( r u | | T 1 ) ) , C 3 = h ( P I D i | | P S j | | A 3 | | Δ S R V i | | T 1 ) .
(5)
Lastly, the smart card sends the authentication request containing { P I D i , P S j , F i ( t ) , C 1 , C 2 , C 3 , T 1 } to D G via the open channel (Login: U i D G : { P I D i , P S j , F i ( t ) , C 1 , C 2 , C 3 , T 1 } ).

3.5. Authentication Phase

In the authentication phase, we mainly consider the mutual authentication in U i D G P S j , and then a session key S K between U i and P S j will be negotiated and used to protect the secret information in future communications.
The first step is Auth-1, where D G verifies the identity of the user and transmits a related message to P S j . The detailed operations are shown in the following.
(1)
Given an authentication request { P I D i , P S j , F i ( t ) , C 1 , C 2 , C 3 , T 1 } from U i , D G first determines whether the time gap of the current timestamp T c and T 1 is less than a threshold value Δ T or not (i.e., | T c T 1 | < Δ T ). If | T c T 1 | > Δ T , D G stops this session.
(2)
Otherwise, D G decrypts F i ( t ) to recover { f i ( t ) , Δ T a u t h , E I D i , t o k e n R V i } by using symmetric key h ( x | | y ) and checks if t o k e n R V i is null. If not, it means that this user’s access has been revoked.
(3)
Otherwise, D G verifies whether f i ( h ( P I D i | | P S j ) ) = h ( x | | t o k e n R V i ) . If not, D G directly discards this request, since U i at this time is not authorized (or does not match) to run authentication with P S j (i.e., P S j Δ S R V i ).
(4)
Otherwise, D G computes L T K i * = h ( P I D i | | x ) , h ( r u * | | T 1 * ) | | A 3 * = C 1 h ( L T K i * | | T 1 ) and Δ S R V i * = C 2 h ( P I D i | | h ( r u * | | T 1 * ) ) . At this moment, D G checks if E I D i * · h ( P I D i | | y ) = h ( y | | P I D i ) . If this holds, it means that U i ’s authentication service has been revoked, and D G discards this session.
(5)
Otherwise, D G verifies if | T c E I D i * · h ( P I D i | | y ) | Δ T a u t h . If not, this denotes that U i ’s time allocated to run authentication with P S j has been exceeded, and D G stops this session.
(6)
Otherwise, D G computes values C 3 * = h ( P I D i | | P S j * | | A 3 * | | Δ S R V i * | | T 1 * ) and checks if C 3 * = C 3 ; if so, D G randomly selects a nonce r g , extracts the timestamp T 2 and then computes L T K j = h ( A V I D j | | x ) , C 4 = A 3 | | r g h ( L T K j | | P S j ) , C 5 = P S j | | h ( L T K i ) h ( L T K j | | r g ) and C 6 = h ( A 3 | | r g | | L T K j | | P S j | | T 2 ) .
(7)
D G transmits the message { P I D i , C 4 , C 5 , C 6 , T 2 } to P S j in the open channel, denoted by Auth-1: D G P S j : { P I D i , C 4 , C 5 , C 6 , T 2 } ).
To facilitate the readers’ understanding, we give the following remark on how the user in a rescue vehicle can only obtain authentication with a specified P S j and be authenticated within a specified time period.
Remark 1. 
A user U i associated with a set Δ S R V i = { P S j } can only be authorized to query authentication with a designated P S j Δ S R V i . In the event that U i wishes to query authentication with some unauthorized node P S k Δ S R V i , this request will be directly declined by D G finding f i ( h ( P I D i | | P S k ) ) h ( x | | t o k e n R V i ) , since only the PS’s identifier in Δ S R V i meets polynomial f i ( t ) , which is preset by C C , and this f i ( t ) is unknown to U i . Thus, each U i will only run authentication with a corresponding authorized P S j .
Remark 2. 
Regarding authentication within a specific timeframe, one occasion is that without retirement or dismissal, some U i ’s time allocated for authentication may be exceeded. At this time, by D G checking | T c E I D i · h ( P I D i | | y ) | Δ T a u t h , U i cannot run authentication with his/her authorized P S j any longer. In the event of retirement and dismissal for U i , regardless of whether | T c E I D i · h ( P I D i | | y ) | Δ T a u t h or not, U i cannot run authentication with his/her authorized P S j any longer by only D G checking if t o k e n R V i = null. This is because, before this authentication session, D G has preset the future token t o k e n R V i n e w = null to revoke this U i (here, this preset operation can be seen in the update step of  Auth-3).
In the following Auth-2, via the received message { P I D i , C 4 , C 5 , C 6 , T 2 } , P S j verifies the identity of D G and then uses the user’s and its own secret to negotiate a session key. The detailed operations can be seen below.
(1)
Upon receiving the message { P I D i , C 4 , C 5 , C 6 , T 2 } , P S j first checks whether | T c T 2 | < Δ T . If not, P S j stops this session.
(2)
Otherwise, P S j obtains A 3 * | | r g * = C 4 h ( L T K j | | P S j ) , and computes P S j * | | h ( L T K i * ) = C 5 h ( L T K j | | r g * ) , C 6 * = h ( A 3 * | | r g * | | L T K j | | P S j * | | T 2 ) and checks if C 6 * = C 6 . If not, P S j ceases the subsequent operations.
(3)
Otherwise, P S j selects a nonce r s , extracts a corresponding timestamp T 3 and computes A 4 = r s · P , A 5 = r s · A 3 .
(4)
P S j computes a session key S K = h ( A 5 | | P I D i | | A V I D j | | P S j | | h ( L T K i ) ) , and then it computes C 7 = A V I D j h ( r g ) , C 8 = A 4 | | h ( S K | | r g ) L T K j , C 9 = h ( A 4 | | h ( S K | | r g ) | | L T K j | | T 3 ) , C 10 = h ( S K | | r g ) L T K j h ( A 4 | | S K ) .
(5)
Eventually, P S j sends the message { C 7 , C 8 , C 9 , C 10 , T 3 } to D G via the open channel, denoted by Auth-2: P S j D G : { C 7 , C 8 , C 9 , C 10 , T 3 } .
Following this, in Auth-3  D G receives P S j ’s message and verifies the identity of P S j . Then, for the user, D G updates the authentication parameters, which include the access control. Further, D G sends the updated message to the user. The detailed operations can be seen in Auth-3.
(1)
With the message sent from P S j , D G first checks whether | T c T 3 | < Δ T . If not, D G stops this session.
(2)
Otherwise, D G computes the values A V I D j * = C 7 h ( r g ) , L T K j * = h ( A V I D j * | | x ) , A 4 * | | h ( S K * | | r g * ) = C 8 L T K j * , C 9 * = h ( A 4 * | | h ( S K * | | r g * ) | | L T K j * | | T 3 ) and checks if C 9 * = C 9 . If not, D G terminates this authentication.
(3)
Otherwise, D G obtains h ( A 4 | | S K ) = C 10 h ( S K | | r g ) L T K j and runs the following update operations.
(4)
D G updates a new pseudonym P I D i n e w for U i .
(5)
D G updates L T K i n e w = h ( P I D i n e w | | x ) .
(6)
D G updates t o k e n R V i n e w = t o k e n R V i . Of course, if the user needs to be revoked, t o k e n R V i n e w = null.
(7)
D G updates E I D i n e w = h ( P I D i n e w | | y ) 1 · T c .
(8)
D G updates Δ T a u t h n e w and sets f i n e w ( t ) = h ( x | | t o k e n R V i n e w ) + A V I D j Δ S R V i n e w ( t h ( P I D i n e w | | P S j ) ) , where Δ S R V i n e w = Δ S R V i with no change for the processor(s); or Δ S R V i n e w = Δ S R V i + Δ S R V i a d d with an added new processor(s); or Δ S R V i n e w = Δ S R V i Δ S R V i d e l with a deleted processor(s); or Δ S R V i n e w = Δ S R V i Δ S R V i d e l + Δ S R V i a d d with a deleted and then a newly added processor(s).
(9)
D G further computes F i ( t ) n e w = E h ( x | | y ) [ f i n e w ( t ) , Δ T a u t h n e w , E I D i n e w , t o k e n R V i n e w ] , C 11 = L T K i n e w L T K i , C 12 = P I D i n e w | | A 4 | | Δ S R V i n e w h ( L T K i n e w | | A 3 ) , and then C 13 = h ( P I D i n e w | | Δ S u n e w | | h ( A 4 | | S K ) | | F i n e w ( t ) ) .
(10)
D G transmits message { F i n e w ( t ) , C 11 , C 12 , C 13 } to U i in the open channel, denoted by Auth-3: D G U i : { F i n e w ( t ) , C 11 , C 12 , C 13 } .
After receiving the response from D G , U i authenticates the D G ’s identity and re-computes the session key. Finally, U i stores the related updated authentication parameters.
(1)
U i computes: L T K i n e w * = C 11 L T K i , P I D i n e w * | | A 4 * | | Δ S R V i n e w * = C 12 h ( L T K i n e w * | | A 3 ) , A 5 * = r u · A 4 * and S K * = h ( A 5 * | | P I D i | | A V I D j | | P S j | | h ( L T K i ) ) .
(2)
U i computes C 13 * = h ( P I D i n e w * | | Δ S R V i n e w * | | h ( A 4 * | | S K * ) | | F i n e w ( t ) ) and then checks if C 13 * = C 13 . If not, U i discards this session.
(3)
If “=” holds, U i regards this S K * as the negotiated session key S K .
(4)
U i updates A 1 n e w = L T K i n e w H P W i , A 2 n e w = h ( I D i | | P W i | | L T K i n e w | | L T K i i | | Δ S R V i n e w ) mod n 0 .
(5)
U i replaces parameters { P I D i , A 1 , A 2 , F i ( t ) } with { P I D i n e w , A 1 n e w , A 2 n e w , F i n e w ( t ) } in smart card S C i .

3.6. Password Change Phase

For enhanced security, users ( U i ) are able to modify or update their password independently, without necessitating an interaction with the command center ( C C ). This process is bifurcated into two primary stages: the verification of the user’s identity, executed by the smart card, followed by U i ’s update of the parameters, including P W i , A 1 , A 2 . The procedural steps for these operations are delineated as follows.
(1)
As described in the login phase, U i first enters the old password P W i o l d and identity I D i in the smart card.
(2)
When the smart card verifies that A 2 * = A 2 holds, it enables U i to choose a new password P W i n e w , and it updates H P W i n e w = h ( I D i | | P W i n e w ) mod n 0 , A 1 n e w = L T K i H P W i n e w , A 2 n e w = h ( I D i | | P W i n e w | | L T K i | | L T K i i | | Δ S R V i ) mod n 0
(3)
The smart card finally replaces parameters { A 1 , A 2 } with { A 1 n e w , A 2 n e w } .

4. Security Analysis of the Proposed Scheme

To properly validate the authentication with access control operation in the application layer, the proposed scheme should be robust in the underlying layer. Next, the security and reliability are further analyzed in the formal analysis (Section 4.1) and the heuristic analysis (Section 4.2).

4.1. Formal Analysis of the Proposed Scheme

In this part, we introduce some basics for the formal proof in Section 4.1.1; then, in Section 4.1.2, we give the detailed security proof in the form of Theorem 1.

4.1.1. Basics for Formal Proof

Before the simulation, the simulator initiates an elliptic curve E ( F p ) over a prime finite field F p . Based on E ( F p ) and a security parameter n, the simulator specifies a q —order additive subgroup G with a generator P, where p, q are two large primes with | q | = n , and the size of P is 320 bits. Next, U i obtains the information { I D i , P W i , B i o i } and the smart card that contains { P I D i , B K G ( · ) , A 1 , A 2 , E I D i , F i ( t ) , S U M }; C C generates a long-term key pair x , y ; P S j owns the identity–secret key pair { A V I D j , L T K j } .
Then, three entities U i , D G , P S j involved in the proposed scheme S instantiate instances U i u , D G g , P S j s , respectively. If there is no need to differentiate the three instances, the instance can be simply marked as t . Further, each instance will be regarded as an oracle; that is, upon receiving an input message that is valid/incorrect or null, the oracle will correspondingly accept/reject it or return “⊥”, meaning that there is no response.
Additionally, we introduce some terms used in the security proof below.
Accepted state . An instance t will be an accepted state if t receives the last expected protocol message. Meanwhile, the ordered concatenation of all sent and received messages will shape the session identifier of t in each session.
Partnering . Two instances t 1 , t 2 are partnered if these two accepted states’ instances t 1 , t 2 are authenticated mutually with the identical session identification being normally shared; meanwhile, t 1 , t 2 are partners.
Adversary . An eCK (extended Canetti–Krawczyk) adversary A is capable of interacting with users ( U i ), the drone gateway ( D G ) or any processor ( P S j ) by initiating information queries to their respective oracles and a simulator. Utilizing the responses obtained, A endeavors to compromise the integrity of the authentication messages and the established session key. The potential queries that A can execute, leveraging the capacities outlined for an eCK adversary in Table 2, include the following:
  • E x e c u t e ( U i u , D G g , P S j s ). A can run a query to simulate the entire authentication process and obtain a desirable message exchange among U i , D G and P S j .
  • S e n d ( t , m ). In a ‘send’ query, A can send a message m and then launch an active attack for a participating instance t . According to the S , if m is valid and t has also received the message m, this simulator returns a response.
  • S e s s i o n K e y R e v e a l ( t ). In this query, besides the session key to be tested, A can obtain the other session keys via S e s s i o n K e y R e v e a l ( t ).
  • E p h e m e r a l K e y R e v e a l ( t ) . This query means that adversary A can obtain the entities’ ephemeral secrets, such as nonces or random numbers.
  • C o r r u p t ( U i u , α { 1 , 0 , 1 } ). In this query, according to the value α , A can acquire related authentication factors stored in U i . Specifically, A retrieves passwords (to α = 1 ), data stored in the smart card (to α = 0 ) and bio-information b i o i (to α = 1 ).
  • C o r r u p t ( D G g ). In this query, A can grasp the long-term key pair ( x , y ) .
  • C o r r u p t ( P S j s ). This query states that the secret of P S j can be obtained by A .
Freshness . Three instances U i u , D G g and P S j s are fresh if A does not grasp the session key between U i and P S j by using the reveal queries shown above.
Test ( t ). The ’test’ query evaluates the semantic security of the session key S K , and, in this query, A is capable of querying only once. According to S , the instance t can be U i u or P S j s . Generally, “⊥” (null) will be returned if instance t has not computed the S K or t is not fresh, or Test ( t ) has been queried before the ‘test’ query. Otherwise, the oracle in this query will choose one unbiased coin b { 0 , 1 } . With the value of b, Test ( t ) returns the final result, i.e., “result = the real session key” (if b = 1 ) or “result = a random string that has the same length as the session key” (if b = 0 ).
Semantic Security . For a given scheme S , a probabilistic polynomial time (PPT) adversary A has made a sequence of queries including Execute ( · ) , Send ( · ) , Corrupt ( · ) , and Reveal ( · ) . Now, A wishes to guess the value of b in the Test query and return a guessed value b * . Let S u c c ( A ) denote the advantage of A correctly guessing b * of b, i.e., b * = b . Then, we define the advantage of A whereby A successfully breaks the session key’s semantic security in the following:
A d v S A = 2 Pr [ S u c c ( A ) ] 1

4.1.2. Semantic Security Proof

In the following, Theorem 1 derives the advantage whereby A can break the semantic security of the session key in the proposed scheme.
Theorem 1. 
Let S be the designed scheme and | D | be the space of the password. Then, a PPT adversary A , by querying Execute ( · ) q e times, Send ( · ) q s times, Hash ( · ) q h times and Biohashing ( · ) q B K G ( · ) times, breaks the semantic security of the session key in S with the following advantage A d v S , D A , which is less than
q h 2 + 6 q s 2 l 1 + ( q s + q e ) 2 p + q B K G ( · ) 2 + 2 q B K G ( · ) 2 l 2 + 2 ( C q s e n d s + A d v p E C D L ( n ) + A d v p E C C D H ( n ) )
Proof. 
Here, we give the theorem’s proof by setting a sequence of games, namely Game1 to Game9. Moreover, let S u c c l denote that A correctly guesses the b in the T e s t query of Gamel, { l = 1 , 2 , , 9 } .
Game1: This game simulates a real attack under the random-or-real oracle. Then, the oracle directly chooses a bit b. Thus,
A d v S , D A = 2 Pr [ Succ 1 ] 1
Game2: This game maintains a hash list Ψ h and a BKG(·) list Φ B K G ( · ) . The adversary A queries a hash value h ( γ ) ; then, the hash oracle Θ h takes γ to retrieve Ψ h . If there is a retrieved hash value h ( γ ) in Ψ h , Θ h returns h ( γ ) . Otherwise, a random string ψ will be returned to A , while ( γ , ψ ) is stored in Ψ h . As for BKG(·)’s oracle Θ B K G ( · ) , it is simulated in the same way with hash oracle Θ h .
Based on the known two lists, A executes a T e s t query to guess the value of b. Factually, given S K = h ( A 5 | | P I D i | | A V I D j | | P S j | | h ( L T K i ) ) , it states that the secret values, including U i ’s r u , L T K i and P S j ’s r s , are embedded in the S K . Thus, without the secret values, A cannot compute S K and has no way to decide whether b = 0 or b = 1 .
Hence, the advantage of winning this game is equal to that of Game1, i.e.,
Pr [ Succ 1 ] = Pr [ Succ 2 ]
Game3: Based on Game2, A in Game3 initiates an active attack to convince a communication entity to accept a forged message by executing queries S e n d ( · ) , H a s h ( · ) , B i o h a s h i n g ( · ) . When compared with Game2, only when a collision is found can a forged message be made, and A ’s advantage can be achieved in Game3. Equally, if the following collisions occur, the game is aborted.
(i) A can find a collision in the hash values or BKG(·)’s outputs, and the probability is q h 2 2 l 1 + 1 or q B K G ( · ) 2 2 l 2 + 1 , where l 1 and l 2 denote the length of the output by function h ( · ) and BKG(·), respectively.
(ii) Another collision that A is capable of finding is the choice of random numbers ( r u , r u , r g , r s Z p * ), with a probability of ( q s + q e ) 2 2 p .
Thus, we have
| Pr [ Succ 3 ] Pr [ Succ 2 ] | q h 2 2 l 1 + 1 + q BKG ( · ) 2 2 l 2 + 1 + ( q s + q e ) 2 2 p
Game4: A in this game wishes to guess C 3 , C 6 , C 9 , C 13 without initiating a hash query or BKG(·) query.
Obviously, we can obtain
| Pr [ Succ 4 ] Pr [ Succ 3 ] | q s 2 l 1
Game5: In this game, A also tries to guess A 1 , but without initiating a hash query or BKG(·) query.
Similarly, we can obtain
| Pr [ Succ 5 ] Pr [ Succ 4 ] | q s 2 l 1
Game6: In this game, via the C o r r u p t ( U i u , α ) query, A plans to compute A 2 . There are three cases considered.
Case1, C o r r u p t ( U i u , α = 1 , 0 ): The probability that A guesses the user’s bio-information is less than q B K G ( · ) 2 l 2 ;
Case2, C o r r u p t ( U i u , α = 0 , 1 ): Based on the technology of “fuzzy keywords + honeywords”, the probability that A guesses U i ’s password is no more than C q s e n d s , in which A has made at most q s e n d active attacks in password space D , and C , s are parameters that can be depicted by a linear regression [32].
Case3, C o r r u p t ( U i u , α = 1 , 1 ): The probability that A guesses the key value of A 1 is less than q s 2 l 1 ;
Therefore, we can obtain
| Pr [ Succ 6 ] Pr [ Succ 5 ] | C q send s + q s 2 l 1 + q BKG ( · ) 2 l 2
Game7: In this game, A interacts with the E p h e m e r a l K e y R e v e a l ( t ) oracle and S e s s i o n K e y R e v e a l ( t ) oracle. Then, A will obtain some outdated session keys S K o u t d a t e d , the nonces r u , r s . Following this, A wishes to corrupt the L T K i . Similarly, given the technology of “fuzzy keywords + honeywords”, A cannot grasp L T K i from smart card S C i . Another possible variation is that A tries to find a collision in the hash values.
Thus, we have
| Pr [ Succ 7 ] Pr [ Succ 6 ] | q h 2 2 l 1 + 1
Game8: In this game, by executing the C o r r u p t ( P S j s ) query and C o r r u p t ( D G g ) query, A can obtain the secret value L T K j of P S j and further A 3 , A 4 . However, given A 3 (resp. A 4 ) in the 320-bit elliptic curve, A cannot resolve r u (resp. r s ) from A 3 (resp. A 4 ), based on the fact that no available PPT solution can be used to break the elliptic curve discrete logarithm problem (ECDLP) [33].
Thus, the following deduction holds:
| Pr [ Succ 8 ] Pr [ Succ 7 ] | Adv p ECDL ( n )
where A d v p E C D L ( n ) denotes the advantage whereby A breaks the (ECDLP) problem.
Game9: This game simulates the case in which A tries to compute the session key; at this time, A no longer asks queries E x e c u t e ( · ) , S e n d ( · ) and C o r r u p t ( · ) . However, given A 3 , A 4 in the 320-bit elliptic curve, A cannot resolve r u , r s to obtain A 5 , based on the fact that no available PPT solution can be used to break the elliptic curve computational Diffie–Hellman (ECCDH) problem [34].
In particular,
| Pr [ Succ 9 ] Pr [ Succ 8 ] | Adv p ECCDH ( n )
where A d v p E C C D H ( n ) denotes the advantage whereby A solves the (ECCDH) problem.
At present, A has no non-negligible advantage to guess b than 1 2 and so Pr [ Succ 9 ] = 1 2 .
Hence, from Equations (1)–(9) and the triangular inequality, we obtain
A d v S , D A = 2 Pr [ Succ 1 ] 1 = 2 Pr [ Succ 9 ] 1 + 2 ( Pr [ Succ 1 ] Pr [ Succ 9 ] ) 2 q h 2 + 6 q s 2 l 1 + ( q s + q e ) 2 p + q BKG ( · ) 2 + 2 q BKG ( · ) 2 l 2 + Δ
Thus, one can see that the PPT adversary A cannot break the semantic security of the session key with a non-negligible advantage A d v S , D A that is less than ( 2 q h 2 + 6 q s 2 l 1 + ( q s + q e ) 2 p + q BKG ( · ) 2 + 2 q BKG ( · ) 2 l 2 + Δ ), where Δ = 2 ( C q s e n d s + A d v p E C D L ( n ) + A d v p E C C D H ( n ) ) . □

4.2. Heuristic Analysis of the Protocol

Utilizing the heuristic analysis method [19], which is a widely recognized approach to assessing security without the need for complex mathematical formulas, provides a straightforward yet comprehensive examination of a scheme or protocol’s security aspects. This analysis demonstrates that the proposed protocol offers essential security features and is resilient against known cyber threats.
(1) Mutual Authentication: Based on the protocol’s login and verification phase, U i and D G authenticate each other as D G checks if C 3 * = C 3 and U i checks if C 13 * = C 13 . D G and P S j can authenticate each other bidirectionally by verifying whether C 6 * = C 6 and C 9 * = C 9 , respectively. Therefore, the proposed protocol can recognize mutual authentication.
(2) Session Key Agreement: Session key agreement means that no one can solely pre-negotiate the session key. Specifically, given S K = h ( A 5 | | P I D i | | A V I D j | | P S j | | h ( L T K i ) ) , it states that S K must consist of U i ’s newly secret r u and P S j ’s timely secret r s , so that no one can manipulate the session key.
(3) Forward Secrecy: This property guarantees that the security of the established session keys remains intact even if the long-term keys of D G are compromised (for instance, through side-channel attacks, SCAs [30,35]). Despite an adversary’s potential knowledge of the long-term keys and subsequent secrets, the complexity of the ECCDH problem prevents the adversary from calculating the session key S K , thereby ensuring the protocol’s resilience in maintaining confidentiality over time.
(4) User Anonymity: User anonymity consists of the user’s identity protection, which cannot be discerned by the adversary, and the user’s un-traceability, which ensures that the adversary cannot distinguish whether two full sessions originate from the same user.
For identity protection, on one hand, in the registration phase, U i only sends the value A 0 to D G and so there is no exposed identity information I D i that the adversary can extract, even if the adversary corrupts the D G . On the other hand, in the verification phase, U i ’s identity I D i has been perfectly embedded in A 2 n e w and still cannot be obtained by the adversary.
For the user’s un-traceability, the randomness inherent in pseudonym P I D i eliminates any statistical properties that an adversary might exploit to determine whether two sessions originate from the same user, thus enhancing privacy.
(5) Processor Impersonation Attack: This attack [19] considers an inside adversary (e.g., the legitimate physician U i ). In this attack scenario, U i could grasp P S j ’s secret key L T K j via his own values ( L T K i , A 4 ) and then impersonate this P S j to create a forged session key for the next new U i n e w . Factually, in this proposed protocol, the adversary cannot grasp the secret value L T K j from { C 8 , C 10 } , since he/she has no secret value r g of D G . As a result, this attack is futile.
(6) Password Guessing Attack: As researched in [36], password guessing attacks can be divided into attack-I, where the adversary leverages the verification value in the smart card to guess the password, and attack-II, where the adversary uses the verification value in the public channel to guess the password.
For attack-I, even if the adversary knows verification values A 1 , A 2 in the smart card, he/she cannot check the correctness of the guessed P W i * and I D i * , since the congruence of the “modulus” operation in H P W i and A 2 and the limited “SUM” seriously affects the correctness of the guessed password of the adversary.
As for the adversary in attack-II, the password-related verification value is only attributed to L T K i . Although the adversary obtains L T K i and even owns A 1 , given the similar congruence of the “modulus” operation in H P W i , he/she cannot verify the correctness of the guessed P W i * and I D i * .
(7) De-Synchronization Attack: A de-synchronization attack may occur if the communication entities have to update any parameters upon the session key that has been established. However, this attack is impossible. Indeed, U i needs to change L T K i to L T K i n e w and the corresponding P I D i to P I D i n e w , Δ S R V i to Δ S R V i n e w . Specifically, U i firstly recovers and names L T K i n e w * , P I D i n e w * , Δ S R V i n e w * from C 11 , C 12 , and then checks if h ( P I D i n e w * | | Δ S R V i n e w * | | h ( A 4 * | | S K * ) ) = C 13 . If so, ‘ n e w * ’ is set to ‘ n e w ’. It is the verification of the correctness of C 13 that guarantees the synchronization update of L T K i , P I D i and Δ S R V i , since U i can instantly detect this attack once h ( P I D i n e w * | | Δ S R V i n e w * | | h ( A 4 * | | S K * ) ) C 13 .
(8) Replay Attack: In a replay attack, the adversary often sends old un-changed messages to try to pass the verification of entities. Indeed, random numbers r , r u , r u , r g and r s are chosen by U i , D G and P S j , respectively. These random numbers ensure the freshness and independence of the exchanged messages in each session; therefore, there are no un-changed messages that can be used to initiate a replay attack.
(9) DoS Attack: In the proposed protocol, in order to render D G unavailable (i.e., a DoS attack), the adversary can replay the old message { ( P I D i , P S j , F i ( t ) , C 1 , C 2 , C 3 , T 1 ) } repeatedly. However, this attack can be effectively eliminated by D G checking if the time gap between the current time T c and T 1 exceeds the set value Δ T (for example, 3 min). If so, D G ignores this session. Further, even the adversary may change T 1 to make the time gap less than Δ T ; D G also discards this session by finding the verification failure regarding value C 3 , where C 3 can only be computed via the original T 1 .
(10) Privileged Insider Attack: In this attack, the adversary (or even a corrupted D G ) can extract the legitimate user’s identity information I D i in the registration phase. Factually, each U i in the proposed protocol sends an A 0 to D G , and I D i cannot be obtained, since the I D i has been encapsulated with r Z p and the “modulus” operation.
(11) Processor’s Node Capture Attack: An adversary capable of compromising a processor to obtain secret L T K j and associated values A 3 and A 4 still cannot compute the session key SK without solving the computationally difficult elliptic curve discrete logarithm problem [33].
(12) Session-Specific Temporary Information Attack: In this attack (also known as the ephemeral secret attack, ESL) [31], the adversary can learn the session key by obtaining nonces such as random numbers r u and r s . However, in our scheme, apart from random numbers, the long-term information L T K i also constitutes the S K and cannot be captured by the adversary.

5. Performance Analysis of the Proposed Scheme

In this section, we present a detailed performance analysis comparing our authentication protocol against seven recent alternatives. This includes a functionality comparison based on the criteria in Table 3, outlined in Table 4, as well as an evaluation of the storage, communication and computational costs, detailed in Table 5.
(1) Functionality Analyses
To evaluate the scheme’s advantages and disadvantages in functionality, we adopt the widely accepted 10 criteria [17], containing five ideal (†*) attributes and five security (‡*) attributes, as described in Table 3. The ‡4 states that certain attacks, namely password guessing attacks, privileged insider attacks, de-synchronization attacks, replay attacks, stolen verifier attacks, node impersonation attacks, processor’s node capture attacks, DoS attacks and session-specific temporary information attacks, with the exception of breaking the user’s smart card, cannot be effectively initiated by the adversary with all capabilities.
In Table 4, for the evaluation of †1 to †5, we can see that all schemes satisfy †1, †2 and †3, i.e., they are password friendly, have sound repairability and provide key agreement. However, †4, †5 differ from the three initially discussed. Specifically, for †4, the scheme of [10,12,13,15] cannot meet this important mutual authentication requirement, because the number of messages (3 or 5) in their scheme does not guarantee that the entities can verify one another’s identities. As for †5, only scheme [15] retains more password-related parameters in the server (or drone gateway) and inevitably results in threats to the password security.
Concerning the five security attributes labeled ‡1 through ‡5, no existing scheme successfully implements them all. Specifically, regarding ‡1, which pertains to user anonymity, the scheme in [15] is lacking. In the scheme in [15], users directly provide their unmasked identities during the registration phase at the registration center. If the gateway is compromised, the users’ anonymity is subsequently at risk. In contrast, our scheme enhances the security by utilizing public key cryptography for attributes ‡3 and ‡4; modular arithmetic for attributes ‡2, ‡4 and ‡5 and a timestamp mechanism for ‡4, thus ensuring robust security measures.
(2) Overhead Comparisons
To facilitate detailed comparisons of the overhead, Table 6 establishes a reasonable reference length for all necessary terms. It is important to note that, according to NIST’s recommendations [23,37], SHA-256 is a collision-resistant hash function suitable for DloV. As for the ECC, in this paper, due to the limited resources of DloV devices, we target the ECC with 80-bit security (i.e., the length of the ECC key is 160 bits). Moreover, our scheme can be easily extended to 128-bit security (i.e., the length of the ECC key will be 256 bits); in this case, one might use future versions of NVIDIA DRIVE AGX Orin [38], which is a high-performance on-board processor.
Subsequently, for the eight authentication schemes, Table 5 presents comparisons of the storage costs, communication costs and time consumption. Additionally, although there are no existing protocols that incorporate access control for the DIoV, several research works on authentication with access control for medical scenarios are available. These can serve as valuable references for the development of authentication with an access control scheme for the DIoV. We have chosen to compare these medical-oriented schemes with our newly designed scheme. Therefore, the costs incurred at the gateway are considered equivalent to those on the DG, and the costs at the sensor node are analogous to those on the processor (PS).
For the storage costs consumed, e.g., in computing the storage costs in our scheme, it is the sum of the sizes of parameters { P I D i , B K G ( · ) , A 1 , A 2 , E I D i , F i ( t ) , S U M } that the user stores. With the reference length in Table 6, the storage costs of the user can be calculated as | P I D i | + | A 1 | + | A 2 | + | E I D i | + | F i ( t ) | + | S U M | = 128 n p s u + 800 bits, where n p s u is the number of processors that the user can be allocated to query authentication, and the size of biometric key generation function B K G ( · ) does not need to be quantized.
Similarly, regarding the user storage costs in other schemes, the schemes of Yao et al. (128 bits) [15] and Soleyma et al. (320 bits) [16] have lower storage costs than the other six schemes. As for the DG’s storage resources that need to be consumed to realize authentication with access control, this value is inevitably influenced by the two parameters n u (the number of users) and n s or n p s u (the number of medical sensor nodes or processor nodes that the user can be allocated to run authentication), and the cost in our scheme is 128 n p s u + 320 bits. Thus, the more processors that are involved in authentication, the more storage resources will be consumed. In evaluating the processor’s storage costs, our scheme and others, with the exception of the schemes proposed by Srinivas et al. [10] and Yao et al. [15], demonstrate efficient storage utilization. Notably, our scheme holds a significant advantage in comparison to the seven state-of-the-art alternatives.
Regarding the communication costs, our scheme incurs higher overheads for the user and the drone gateway (DG), requiring 1344 bits and 2080 bits, respectively, to ensure secure authentication. The processor’s communication costs in our scheme, amounting to 1216 bits, are competitive with those of other schemes.
Regarding the comparison of the time consumed in all eight schemes, recent research [39] shows that the running time for ECC point multiplication is 0.508 ms; symmetric encryption and decryption (AES-128) take about 0.00054 ms each and a hash function (SHA-256) takes about 0.182 ms [23], and this value can be regarded as the runtime of B K G ( · ) . In [13], a PUF operation takes 0.43 ms. Note, that although the running times of these operations were tested in different works, this does not affect the results of the comparison, and the chosen approach has been widely utilized in previous works.
Based on Table 5, to secure the agreed session key, the time consumed by the user is 3.352 ms, which is reduced by 66% compared with Srinivas et al.’s scheme [10]. The time taken by the DG to complete user and processor authentication is 3.823 ms. To establish a robust session key with forward secrecy, leveraging Diffie–Hellman key exchange technology [15,40], the processor in our scheme requires 2.836 ms, which is a significant 43% reduction compared to Yao et al.’s scheme [15].
Overall, our scheme excels or is at least competitive in terms of the storage, communication and computational time costs, setting a benchmark for efficiency that other schemes struggle to meet, particularly in addressing security vulnerabilities.

6. Conclusions

Our authentication mechanism, tailored to the service type of rescue vehicles, ensures that only authorized users can achieve mutual authentication with a designated processor, thereby enhancing user privacy and data protection. By balancing security with performance, we have developed a more efficient and robust authentication protocol with access control. The command center (CC) specifies the access control, processed by the DG, allowing rescue vehicle users to authenticate and negotiate session keys with the designated processor (PS). The security analysis confirms the protocol’s capability for mutual authentication, ensuring the session key’s forward secrecy and maintaining users’ anonymity. The performance analysis further reveals the protocol’s efficiency and cost-effectiveness, particularly highlighting a significant reduction in operational time by at least 66% compared to recent proposals [10]. At present, fog computing [41,42] represents a novel paradigm; it can effectively enhance latency-sensitive applications such as catastrophe management and content transference applications. Thus, our future research will focus on developing an authentication encryption protocol to secure data communication within fog computing environments.

Author Contributions

Validation, methodology, writing—original draft, J.Z. and C.W.; writing—review and editing, Q.C. and R.F.; validation, H.D. and G.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was mainly supported by the National Key Research and Development Program of China under grant no. 2023YFB2504801 (Data Security Risk Evolution Mechanism and Security Framework for Vehicle-Road-Cloud Multi-Network Convergence System).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Menouar, H.; Guvenc, I.; Akkaya, K.; Uluagac, A.; Kadri, A.; Tuncer, A. UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges. IEEE Commun. Mag. 2017, 55, 22–28. [Google Scholar] [CrossRef]
  2. Miao, J.; Wang, Z.; Ning, X.; Shankar, A.; Maple, C.; Rodrigues, J. A UAV-Assisted Authentication Protocol for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2024. early access. [Google Scholar] [CrossRef]
  3. Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 2019, 48, 102354. [Google Scholar] [CrossRef]
  4. Ever, Y.K. A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications. Comput. Commun. 2020, 155, 143–149. [Google Scholar] [CrossRef]
  5. Wang, D.; Wang, P.; Wang, C. Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in wsns. ACM Trans. Cyber-Phys. Syst. 2020, 4, 1–26. [Google Scholar] [CrossRef]
  6. Manivannan, D.; Moni, S.; Zeadally, S. Secure authentication and privacy-preserving techniques in vehicular ad hoc networks (VANETs). Veh. Commun. 2020, 25, 100247. [Google Scholar] [CrossRef]
  7. Zhang, J.; Cui, J.; Zhong, H.; Bolodurina, I.; Liu, L. Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2982–2994. [Google Scholar] [CrossRef]
  8. Khan, M.; Ullah, I.; Alkhalifah, A.; Rehman, S.; Shah, J.; Uddin, M.; Alsharif, M.; Algarni, F. A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems. IEEE Trans. Ind. Inform. 2022, 18, 3416–3425. [Google Scholar] [CrossRef]
  9. Voigt, P.; Von dem Bussche, A. The EU General Data Protection Regulation (GDPR): A Practical Guide, 1st ed.; Springer: Berlin, Germany, 2017; p. 10-5555. [Google Scholar]
  10. Srinivas, J.; Das, A.; Kumar, N.; Rodrigues, J. Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Dependable Secur. Comput. 2018, 17, 942–956. [Google Scholar] [CrossRef]
  11. Aghili, S.; Mala, H.; Shojafar, M.; Peris-Lopez, P. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Futur. Gener. Comp. Syst. 2019, 96, 410–424. [Google Scholar] [CrossRef]
  12. Banerjee, S.; Odelu, V.; Das, A.; Srinivas, J.; Kumar, N.; Chattopadhyay, S.; Choo, K. A provably secure and lightweight anonymous user authenticated session key exchange scheme for internet of things deployment. IEEE Internet Things J. 2019, 6, 8739–8752. [Google Scholar] [CrossRef]
  13. Kumar, D.; Jain, S.; Khan, A.; Pathak, P. An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things. J. Ambient Intell. Humaniz. Comput. 2020, 14, 5067–5083. [Google Scholar] [CrossRef]
  14. Alzahrani, B.; Chaudhry, S.; Barnawi, A.; Xiao, W.; Chen, M.; Al-Barakati, A. ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment. J. Ambient Intell. Humaniz. Comput. 2020, 13, 5123–5135. [Google Scholar] [CrossRef]
  15. Yao, H.; Yan, Q.; Fu, X.; Zhang, Z.; Lan, C. ECC-based lightweight authentication and access control scheme for IoT E-healthcare. Soft Comput. 2022, 26, 4441–4461. [Google Scholar] [CrossRef]
  16. Soleymani, S.; Goudarzi, S.; Anisi, M.; Jindal, A.; Kama, N.; Ismail, S. A privacy-preserving authentication scheme for real-time medical monitoring systems. IEEE J. Biomed. Health Inform. 2023, 27, 2314–2322. [Google Scholar] [CrossRef]
  17. Wang, C.; Wang, D.; Tu, Y.; Xu, G.; Wang, H. Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2020, 19, 507–523. [Google Scholar] [CrossRef]
  18. Zou, S.; Cao, Q.; Lu, R.; Wang, C.; Xu, G.; Ma, H.; Cheng, Y.; Xi, J. A robust and effective 3-factor authentication protocol for smart factory in IIoT. Comput. Commun. 2024, 220, 81–93. [Google Scholar] [CrossRef]
  19. Zou, S.; Cao, Q.; Wang, C.; Huang, Z.; Xu, G. A robust two-factor user authentication scheme-based ECC for smart home in IoT. IEEE Syst. J. 2022, 16, 4938–4949. [Google Scholar] [CrossRef]
  20. Das, M. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086–1090. [Google Scholar] [CrossRef]
  21. Awais, S.; Wu, Y.; Mahmood, K.; Muhammad, H.; Badar, S.; Kharel, R.; Das, A. Provably secure fog-based authentication protocol for VANETs. Comput. Netw. 2024, 246, 110391. [Google Scholar] [CrossRef]
  22. Su, H.; Dong, S.; Wang, N.; Zhang, T. An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs. Veh. Commun. 2024, 45, 100727. [Google Scholar] [CrossRef]
  23. El-Zawawy, M.; Brighente, A.; Conti, M. Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 2023, 20, 1775–1789. [Google Scholar] [CrossRef]
  24. Wang, C.; Wang, D.; Duan, Y.; Tao, X. Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. IEEE Trans. Inf. Forensic Secur. 2023, 18, 2961–2976. [Google Scholar] [CrossRef]
  25. Han, Y.; Guo, H.; Liu, J.; Ehui, B.; Wu, Y.; Li, S. An enhanced multi-factor authentication and key agreement protocol in Industrial Internet of Things. IEEE Internet Things J. 2024, 11, 16243–16254. [Google Scholar] [CrossRef]
  26. Shen, H.; Wang, T.; Chen, J.; Tao, Y.; Chen, F. Blockchain-based Batch Authentication Scheme for Internet of Vehicles. IEEE Trans. Veh. Technol. 2024. early access. [Google Scholar] [CrossRef]
  27. Chen, Y.; Zhang, J.; Wei, X.; Wang, Y.; Cui, J. Cross-Domain Authentication Scheme for Vehicles Based on Given Virtual Identities. IEEE Internet Things J. 2024, 11, 15869–15879. [Google Scholar] [CrossRef]
  28. Li, X.; Niu, J.; Bhuiyan, M.; Wu, F.; Karuppiah, M.; Kumari, S. A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans. Ind. Inform. 2018, 14, 3599–3609. [Google Scholar] [CrossRef]
  29. NIST. Recommendation for Key Management-Part 1: General. Standard SP 800-57 (Part 1, Rev. 5). 2020. Available online: https://csrc.nist.gov/pubs/sp/800/57/pt1/r5/final (accessed on 13 May 2020).
  30. Nannipieri, P.; Crocetti, L.; Matteo, S.; Fanucci, L.; Saponara, S. Hardware Design of an Advanced-Feature Cryptographic Tile within the European Processor Initiative. IEEE Trans. Comput. 2023. early access. [Google Scholar] [CrossRef]
  31. LaMacchia, B.; Lauter, K.; Mityagin, A. Stronger security of authenticated key exchange. In Proceedings of the International Conference on Provable Security, ProvSec 2007, Berlin, Germany, 1–2 November 2007; pp. 1–16. [Google Scholar]
  32. Wang, D.; Wang, P. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secur. Comput. 2018, 15, 708–722. [Google Scholar] [CrossRef]
  33. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  34. Li, X.; Peng, J.; Obaidat, M.; Wu, F.; Khan, M.; Chen, C. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 2020, 14, 39–50. [Google Scholar] [CrossRef]
  35. Matteo, S.; Baldanzi, L.; Crocetti, L.; Nannipieri, P.; Fanucci, L.; Saponara, S. Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications. Energies 2021, 14, 4676. [Google Scholar] [CrossRef]
  36. Wang, C.; Xu, G. Cryptanalysis of three password-based remote user authentication schemes with non-tamper-resistant smart card. Secur. Commun. Netw. 2017, 2017, 1619741. [Google Scholar] [CrossRef]
  37. Cryptographic Key Length Recommendation. Available online: https://www.keylength.com/en/4/ (accessed on 24 May 2020).
  38. Available online: https://www.nvidia.com/content/dam/en-zz/Solutions/self-driving-cars/drive-platform/auto-print-drive-product-brief-final.pdf (accessed on 13 May 2020).
  39. Wang, C.; Wang, D.; Xu, G.; He, D. Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0. Sci. China-Inf. Sci. 2022, 65, 112301. [Google Scholar] [CrossRef]
  40. Ma, C.-G.; Wang, D.; Zhao, S.-D. Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 2014, 27, 2215–2227. [Google Scholar] [CrossRef]
  41. Hashemi, S.; Sahafi, A.; Rahmani, A.; Bohlouli, M. Service and Energy Management in Fog Computing: A Taxonomy Approaches, and Future Directions. J. Electr. Comput. Eng. Innov. 2024, 12, 15–38. [Google Scholar]
  42. Sadri, A.; Rahmani, A.; Saberikamarposhti, M.; Hosseinzadeh, M. Fog data management: A vision, challenges, and future directions. J. Netw. Comput. Appl. 2021, 174, 102882. [Google Scholar] [CrossRef]
Figure 1. Accident rescue in DIoV.
Figure 1. Accident rescue in DIoV.
Electronics 13 01939 g001
Figure 2. System model in the proposed scheme.
Figure 2. System model in the proposed scheme.
Electronics 13 01939 g002
Figure 3. Login and authentication phase.
Figure 3. Login and authentication phase.
Electronics 13 01939 g003
Table 1. Definitions of symbols used in the proposed scheme.
Table 1. Definitions of symbols used in the proposed scheme.
SymbolDefinitionSymbolDefinition
XOR operation P W i U i ’s password
h(·)secure hash function I D i U i ’s real identity
| | concatenate operation P I D i U i ’s pseudonym
B K G (·)bio key generation b i o i U i ’s biometric information
P S j identifier of processor in A V j L T K i ( L T K j ) U i ’s ( P S j ’s) secret value
U i legitimate user of rescue vehicle R V i A V I D j A V j ’s unique identity
, public channel, secure channel x , y long-term key pair of D G
Note. Similarly to [28], this paper uses B K G ( · ) to indicate the entire step dealing with the user’s biometric information, i.e., B K G ( · ) G e n ( · ) + R e p ( · ) . Given the limited space, researchers can refer to the detailed G e n ( · ) , R e p ( · ) in [28]’s Sec. II-B.
Table 2. Description of eCK (extended Canetti–Krawczyk) adversary capacities [31].
Table 2. Description of eCK (extended Canetti–Krawczyk) adversary capacities [31].
I*Attack Capacities
C1 A can acquire previous session keys between communication entities
C2 A can learn D G ’s secret key pair when considering the system’s eventual failure
C3 A can obtain ephemeral secrets when testing the security of the session key
C4 A can fully control the open channel and then intercept, modify, insert and delete any transmitted messages from the open channel
C5 A can enumerate all items offline in the Cartesian product of identity space and password space D i d × D p w within polynomial time
C6 A can break some processor and then extract the stored sensitive data and even control the broken processor to participate in the next communication interaction
C7In a 3-factor user authentication scheme, A can compromise two of the three following factors: (a) password; (b) data in the smart card; (c) bio-information
Table 3. Ten criteria for evaluation of authentication schemes.
Table 3. Ten criteria for evaluation of authentication schemes.
*Ideal Attributes*Security Attributes
1Password friendly1User anonymity
2Sound repairability2No password exposure
3Provision of key agreement3Forward secrecy
4Mutual authentication4Resistance to known attacks
5No password verification table5No smart card loss attack
Table 4. Summary of functionality comparison among all authentication schemes.
Table 4. Summary of functionality comparison among all authentication schemes.
SchemeRef.No. MessagesCriteria
1 2 3 4 5 1 2 3 4 5
Srinivas et al . [10] 3 Y Y Y N Y Y N Y N N
Aghili et al . [11] 4 Y Y Y Y Y Y N N N N
Banerjee et al . [12] 3 Y Y Y N Y Y N N N N
Kumar et al . [13] 3 Y Y Y N Y Y Y N N Y
Alzahranl et al . [14] 4 Y Y Y Y Y Y N N N N
Yao et al . [15] 5 Y Y Y N N N N Y N N
Soleymani et al . [16] 6 Y Y Y N Y N
Our scheme 4 Y Y Y Y Y Y Y Y Y Y
Table 5. Comparisons of storage, communication and computational costs among eight authentication schemes.
Table 5. Comparisons of storage, communication and computational costs among eight authentication schemes.
SchemeRef.Storage Cost: bitsCommunication Cost: bitsComputational Cost: ms
User DG PS User DG PS User DG PS
Srinivas et al . [10] 2208 384 n s + 3072 512 n u + 384 80010561056 9.952 9.042 2.184
Aghili et al . [11] 1312 512 ( n u + n s ) + 160 28814721344448 2.184 2.548 0.728
Banerjee et al . [12]1408 128 n s + 160 416416160544 1.822 0.913 0.365
Kumar et al . [13]1440 256 n s + 160 256416160544 1.275 1.095 0.366
Alzahranl et al . [14]1536 128 n s + 160 416704704416 2.369 1.094 0.367
Yao et al . [15]128 128 n s n u + 896 ( n u + n s ) + 160 256 + 384 n u 121615683104 3.018 3.746 4.97
Soleymani et al . [16]320 864 n s + 160 8648002208544 2.98 3.708 2.98
Our scheme 128 n p s u + 800 128 n p s + 320 256134420801216 3.352 3.823 2.836
★ Here, we do not additionally evaluate the storage costs for the following functions stored: hash h(·) [10], biohash hBio(·) [11,15] and PUF(·) [15].
Table 6. The reference length of all terms.
Table 6. The reference length of all terms.
Symbolsbits
hash value ( h ) 256 [37]
ECC point ( p ) 320 [33,35]
counter ( S U M ) 32
timestamp ( t )
modulus ( n 0 )
secret key ( x ) 160
random/nonce ( r )
biometric key generation ( B K G ( · ) )
user’s/processor’s identity ( I D ) 128
tolerance error value ( t e v )
symmetric ciphertext size ( e n c )
public reproduction parameter ( p r p )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, J.; Duan, H.; Wang, C.; Cao, Q.; Xu, G.; Fang, R. A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles. Electronics 2024, 13, 1939. https://doi.org/10.3390/electronics13101939

AMA Style

Zheng J, Duan H, Wang C, Cao Q, Xu G, Fang R. A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles. Electronics. 2024; 13(10):1939. https://doi.org/10.3390/electronics13101939

Chicago/Turabian Style

Zheng, Jihu, Haixin Duan, Chenyu Wang, Qiang Cao, Guoai Xu, and Rui Fang. 2024. "A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles" Electronics 13, no. 10: 1939. https://doi.org/10.3390/electronics13101939

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop