Next Article in Journal
On Symmetry Properties of Tensors for Electromagnetic Deformable Solids
Previous Article in Journal
Using Voronoi Tessellation Diagrams to Visualize the Mechanical Response of Interacting Axisymmetric Simultaneous Propagating Waves
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones

Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(4), 556; https://doi.org/10.3390/sym17040556
Submission received: 8 March 2025 / Revised: 24 March 2025 / Accepted: 2 April 2025 / Published: 5 April 2025
(This article belongs to the Section Computer)

Abstract

The implementation of the Authentication and Key Agreement (AKA) protocol in the Internet of Drones (IoD) is crucial for enhancing the security and reliability of information transmission. However, almost all existing authentication protocols between drones and Ground Station (GS) may suffer from several attacks due to capture attacks. In addition, the authentication between drones requires the participation of GS, which not only increases the amount of computation and transmission but also faces challenges such as impersonation attacks, lack of privacy protection, and perfect forward security. Therefore, we propose a secure and lightweight drone-to-GS (D2G) and D2D AKA protocol with perfect forward secrecy for IoD. Our protocol integrates physical unclonable functions (PUF) symmetrically into GS and drones to protect secret information against capture attacks while ensuring that GS does not store secret information related to drones. Furthermore, the proposed protocol enables direct mutual authentication between drones in a symmetrical manner without GS involvement, improving security and efficiency, particularly in scenarios where drones must collaborate without GS connectivity. Formal security proof using the random oracle model confirms the protocol’s resilience against various attacks. The performance analysis indicates that our scheme improves computational efficiency by an average of 39.44% compared to existing schemes that offer comparable security. Additionally, our approach incurs zero storage overhead during the GS authentication process. This protocol offers a secure and efficient solution for IoD, enhancing both security and scalability.
Keywords: authentication protocol; Internet of Drones (IoD); drone-to-ground station; drone-to-drone; physical unclonable function (PUF) authentication protocol; Internet of Drones (IoD); drone-to-ground station; drone-to-drone; physical unclonable function (PUF)

Share and Cite

MDPI and ACS Style

Xie, Q.; Zhang, J. Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones. Symmetry 2025, 17, 556. https://doi.org/10.3390/sym17040556

AMA Style

Xie Q, Zhang J. Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones. Symmetry. 2025; 17(4):556. https://doi.org/10.3390/sym17040556

Chicago/Turabian Style

Xie, Qi, and Jilin Zhang. 2025. "Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones" Symmetry 17, no. 4: 556. https://doi.org/10.3390/sym17040556

APA Style

Xie, Q., & Zhang, J. (2025). Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones. Symmetry, 17(4), 556. https://doi.org/10.3390/sym17040556

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop