Next Article in Journal
ABLA: Application-Based Load-Balanced Approach for Adaptive Mapping of Datacenter Networks
Next Article in Special Issue
A Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring
Previous Article in Journal
Leveraging Memory Copy Overlap for Efficient Sparse Matrix-Vector Multiplication on GPUs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles

by
Vincent Omollo Nyangaresi
1,
Hend Muslim Jasim
2,
Keyan Abdul-Aziz Mutlaq
3,
Zaid Ameen Abduljabbar
2,4,5,*,
Junchao Ma
6,*,
Iman Qays Abduljaleel
7 and
Dhafer G. Honi
2
1
Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science & Technology, Bondo 40601, Kenya
2
Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq
3
IT and Communication Center, University of Basrah, Basrah 61004, Iraq
4
Technical Computer Engineering Department, Al-Kunooze University College, Basrah 61001, Iraq
5
Shenzhen Institute, Huazhong University of Science and Technology, Shenzhen 518000, China
6
College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China
7
Department of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq
*
Authors to whom correspondence should be addressed.
Electronics 2023, 12(17), 3688; https://doi.org/10.3390/electronics12173688
Submission received: 4 July 2023 / Revised: 1 August 2023 / Accepted: 25 August 2023 / Published: 31 August 2023
(This article belongs to the Special Issue Protocols and Mechanisms for Emerging Network Technologies)

Abstract

:
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although the collected data in some of these application domains are sensitive, public channels are deployed during the communication process. Therefore, many protocols have been presented to preserve the confidentiality and integrity of the exchanged messages. However, numerous security and performance challenges have been noted in the majority of these protocols. In this paper, an elliptic curve cryptography (ECC) and symmetric key-based protocol is presented. The choice of ECC was informed by its relatively shorter key sizes compared to other asymmetric encryption algorithms such as the Rivest–Shamir–Adleman (RSA) algorithm. Security analysis showed that this protocol provides mutual authentication, session key agreement, untraceability, anonymity, forward key secrecy, backward key secrecy, and biometric privacy. In addition, it is robust against smart card loss, password guessing, known secret session temporary information (KSSTI), privileged insider, side-channeling, impersonation, denial-of-service (DoS), and man-in-the-middle (MitM) attacks. The comparative performance evaluation showed that it has relatively low computation, storage, and communication complexities.

1. Introduction

Unmanned aerial vehicles (UAVs), popularly known as drones, are smart machines with Internet of Things (IoT) connections that fly over certain regions to provide numerous real-time services [1]. For instance, they have been extensively deployed in areas such as intelligent transportation systems (ITSs), the detection and collection of environmental data, emergency rescue, autonomous driving, the creation of high-definition maps in real-time, and military applications [2,3]. In UAV-enabled ITSs, car sharing, real-time map creation, and autonomous driving can be facilitated [4]. In the military, surveillance, reconnaissance, intelligence collection, ground strikes, and fire guidance are enabled. As explained in [5,6], UAVs can also be applied in civil aviation, industrial setups, and areas that are dangerous or difficult for humans to reach, such as during earthquake searches and gas leak detection. In some cases, these drones can serve as relay nodes in mobile and wireless sensor network (WSN) communications. The authors of [7] pointed out that UAVs can be considered as extensions of Internet of Vehicle (IoV) communication that can offer aerial interfaces for vehicles. All these applications stem from the various salient UAV features, such as low cost and flexible operation [8].
In some of the above UAV application domains, sensitive data are collected and exchanged with cellular networks as well as other ubiquitous devices [9]. Unfortunately, message exchange across UAV networks is accomplished over public channels [10,11,12]. This renders these networks susceptible to attacks such as impersonation, session key disclosure, message replays, man-in-the-middle (MitM) attacks, tracking, and eavesdropping [4,13,14,15,16,17]. The deployment of drones in dangerous, remote, and unmonitored regions exposes them to physical capture attacks [3,18]. Upon capture attacks, the security parameters stored in the UAV memory can be retrieved, and hence confidential information can be leaked. This leads to privacy and security violations [19]. It is also possible for these data to be compromised and the drone to be deployed as a weapon by the attacker [20]. In addition, message replays can cause inaccurate information to be transmitted to UAVs, which can cause their collision. Moreover, data breaches and theft are on the rise in UAV and Internet of Drones (IoD) networks [21]. Most of the UAV-assisted IoV protocols depend on local edge infrastructure and are unable to independently execute secure data transmissions [22,23,24,25]. Therefore, strong data encryption and mutual authentication should be implemented. However, UAVs are resource-limited in terms of energy, storage, communication, and computing capabilities [9]. As such, they are not able to the handle extensive cryptographic operations required in most of conventional encryption schemes [3].

1.1. Problem Statement and Motivation

UAVs have been deployed in highly sensitive domains such as military surveillance. As such, strong security protection should be accorded to the exchanged messages. Therefore, numerous cryptographic key encryption schemes have been deployed for confidentiality preservation in UAVs. However, the conventional key distribution techniques used in these schemes present some difficulties in dynamic environments where UAVs randomly join and leave the network [26]. Worse still, many UAVs do not have inbuilt authentication mechanisms [27]. There is therefore a need for innovative approaches to securing the UAV communication environment. This may include access control, key management, intrusion detection, user authentication, intrusion prevention, and location and identity privacy [28].

1.2. Contributions

The main contributions of this paper include the following:
  • An authentication protocol that leverages symmetric key and elliptic curve cryptography was developed to protect UAV message exchanges.
  • A masking technique was deployed to preserve both operator biometric privacy and anonymity.
  • Extensive security analysis was carried out to show that our protocol upholds mutual authentication, session key agreement, untraceability, anonymity, forward key secrecy, backward key secrecy, and biometric privacy. In addition, this protocol was demonstrated to be resilient against smart card loss, password guessing, KSSTI, privileged insider, side-channeling, impersonation, DoS, and MitM attacks.
  • A performance evaluation was executed to show that the proposed protocol attained a 87.5% improvement in privacy and security provision at relatively low computation, storage, and communication complexities.
The rest of this paper is structured as follows: Section 2 discusses the related work, while Section 3 presents the proposed protocol. Section 4 details the security evaluation of our protocol. This is followed by the performance evaluation in Section 5. Finally, Section 6 concludes the paper and presents future research directions.

2. Related Work

UAV security and privacy has attracted a lot of attention from industry and academia, and hence many schemes have been developed in the recent past. For instance, blockchain-based authentication schemes were presented in [4,29], while a blockchain-based risk management system for drones was introduced in [30]. However, the deployment of blockchain technology incurs high storage, communication, and computation overheads during consensus building [31]. To address this challenge, lightweight authentication schemes were introduced in [3,32,33,34,35]. However, the protocol in [33] failed to offer session key agreement and was not robust against de-synchronization attacks. Although the Physically Unclonable Functions (PUFs) used in [3,32] prevent physical capture attacks, PUFs have stability issues [36], while the scheme in [34] was susceptible to drone capture attack [9]. The protocol in [35] was vulnerable to side-channel attacks, which could be employed to retrieve the credentials stored in memory [9]. This problem could be alleviated by the elliptic curve cryptography (ECC) and symmetric key-based protocol developed in [37]. However, this approach incurred high communication and processing overheads [9].
To enhance privacy, authentication schemes were introduced in [38,39,40,41]. Unfortunately, the authentication of all drones was centralized in [38], which could present a single point of failure. The scheme in [39] was vulnerable to privileged insider attacks, while the protocol in [40] had high computation costs. Similarly, the certificate-based technique in [41] lacked mutual authentication, and hence the integrity of the communication process was not upheld [42]. Based on symmetric key functions, an authentication scheme was introduced in [43]. However, the usage of the management server’s static identity during authentication implied that anonymity was not preserved. In addition, the deployed timestamps were publicly shared, and this could lead to de-synchronization attacks. Although the ECC and blockchain-based protocol in [44] could solve this challenge, the blockchain technology and multiplication operations utilized here resulted in extensive computation costs [45]. Similarly, the robust authentication scheme presented in [46] had high computation costs associated with ECC multiplication operations. In addition, this protocol failed to preserve reliability and anonymity [9].
To provide authentication between UAVs and the vehicles in a UAV-enabled ITS environment, an ECC-based protocol was developed in [47]. Similarly, an ECC-based scheme was introduced in [48]. However, the deployed public key cryptosystem in [47] resulted in high computation overheads [49]. In addition, this scheme failed to authenticate the drone to the roadside unit (RSU). The protocol developed in [48] did not solve privacy leakages [9]. The scheme in [50] was lightweight and could address the performance challenges in [47]. Similarly, the protocol in [51] was anonymous and hence could solve the privacy leak issues in [48]. However, the technique in [50] was not scalable, could only be used within one flying zone, and could not preserve untraceability [3]. In addition, it was susceptible to stolen verifier attacks, which could further facilitate user or drone spoofing [9]. The protocol developed in [52] could potentially solve this problem. However, this scheme did not support re-authentication and was vulnerable to node capture and tampering attacks. In addition, it incurred heavy computation costs [9]. Similarly, the protocol presented in [53] had high computation costs owing to its extensive ECC multiplication operations.
To offer dynamic membership authentication, a trusted authority (TA)-based protocol was introduced in [54]. However, the usage of public-key cryptosystem during mutual authentications resulted in high computation overheads [55]. Similarly, the protocol presented in [56] incurred huge communication and computation costs. In addition, it could not provide traceability or confidentiality and was vulnerable to ephemeral secret leakage attacks [29]. The quadratic residue-based technique presented in [57] could address this issue, although it failed to provide session key agreement and resilience against privileged insider attacks.
It is evident that most of the current techniques for UAVs still have some performance, security, and privacy issues that need to be solved. In addition, the majority of the current techniques deal with user and UAV authentication, ignoring the security issues in mobile sink nodes [58]. The proposed scheme is shown to address some of these security and privacy issues at relatively low complexities.

3. The Proposed Protocol

The network model in our protocol includes a registration authority (RA), UAVs, and their operators, as shown in Figure 1. During the registration process, secure communication channels are deployed. However, public wireless channels are utilized during the subsequent authentication, key agreement, and data exchanges.
In terms of execution phases, the proposed protocol consists of five major phases. These include system initialization, registration, mutual authentication, the session parameter update phase, and the revocation phase. Table 1 presents the symbols used throughout this paper.

3.1. System Initialization Phase

During this phase, the registration authority generates and distributes the security tokens that are deployed in the later stages, including mutual authentication and key agreement. This process is depicted in Figure 2 below.
  • Step 1: To commence this process, the RA generates its unique identity IDRA; channel parameter CP; and cyclic additive group CAG, whose order is r. This is followed by the selection of SKRA as the secret key, h(.) as the one-way hashing function, ℙ as the generator of CAG, and PKRA as the private key.
  • Step 2: Next, the RA computes PUKRA = ℙ.PKRA, followed by the publication of parameter {ℙ, PKRA, h(.)}. Here, ℙ, SKRA, PKRA Z r * , h: [0, 1]* → [0, 1]n; CP is an integer gauging the fuzzy verifier’s robustness against online guessing attacks; and n is h(.)’s output length.

3.2. Registration Phase

Before the UAVs and operators can start the communication process, they have to be registered at the RA. In this phase, the registration authority generates and forwards a secret key for each UAV. On the other hand, the RA stores the operator secret keys in the smart card (SC) before issuing this card to the UAV operator.
  • Step 1: During UAV registration, the UAV chooses its identity IDUAV, which is then sent to the RA through certain secure channels, as shown in Figure 2.
  • Step 2: Upon receiving identity IDUAV, the RA generates random number R1, which it utilizes to derive A1 = h(IDUAV||SKRA||R1). It then stores parameter set {IDUAV, R1} in its database. Finally, it securely transmits {A1} to the UAV, which in turn stores it securely in its memory.
  • Step 3: During UAV operator registration, each operator generates a unique identity IDOP and sends it to the RA through certain secure channels.
  • Step 4: On receiving IDOP from the operator, the RA generates random number R2 before deriving A2 = h(IDOP||SKRA||R2) and A3 = h(IDSC||SKRA). Next, it stores parameter set {IDOP, IDSC, R2, PIDOP} in its database. Finally, the RA inserts parameters {A2, A3, ℙ, PUKRA, CP, h(.),Gen(.), Fe(.)} into the smart card before securely delivering this card to the operator.
  • Step 5: Upon receiving the smart card, the operator inputs parameter set {IDOP, PWOP, β} to the smart card reader, at which point the biometric key and template algorithms are invoked, deriving (βk, βT) = Gen(β), A4 = A2 h(IDOP||PWOP||βk), A5 = A3 h(IDOP PWOP βk) and fuzzy verifier VF = h(h(IDOP||PWOP||βk) mod CP). Lastly, the user stores {A4, A5, VF, βT,ℙ, PUKRA, CP, h(.),Gen(.), Fe(.)} in the smart card.

3.3. Mutual Authentication and Key Negotiation Phase

During this phase, the operator identity is validated so as to establish several secure channels between the RA, UAV, and operator. This is a seven-step process, as described below and depicted in Figure 3.
  • Step 1: To access the UAV network, the operator inserts the smart card into the reader, at which point the security parameters {IDOP*, PWOP*, β*} are input. Thereafter, the SC derives βk* = Gen (βT, β*), VF* = h(h(IDOP*||PWOP*||βk*) mod CP). It then checks if VF* ≟ VF such that the session is terminated when these two values are not equivalent. Otherwise, it computes parameters A2 = A2 h(IDOP*||PWOP*||βk*) and A3 = A5 h(IDOP* PWOP* βk*).
  • Step 2: Next, it generates random number R3 Z r * and secret key S K 1 before computing security parameters B1 = (R3.ℙ), B2 = h(B1||IDOP||IDRA), B3 = (A2ℙ + B1B2), B4 = E P U K R A (A2 + R3B2), B5 = h(IDOP||A2||A3|| S K 1 ), C1 = h(B4||B3||IDRA), and C2 = E C 1 (IDOP||B1||B5||IDUAV). Finally, the operator composes message M1 = {B3, C2, S K 1 }, which it transmits to the RA over public channels.
  • Step 3: Upon receiving message M1 from the operator, the RA derives B4 = PKRAB3 and C1 = h(B4||B3||IDRA). It then deploys the just computed C1 to decipher C2 and obtain parameter set {IDOP, B1, B5, and IDUAV}. Next, it retrieves the IDSC and R2 corresponding to the obtained IDOP. Thereafter, it derives A2 = h(IDOP||SKRA||R2), A3 = h(IDSC||SKRA), B2 = h(B1||IDOP||IDRA), B5* = h(IDOP||A2||A3|| S K 1 ), and B3* = (A2.ℙ + B1.B2). It then checks if B5* ≟ B5 and B3* ≟ B3 such that it rejects the authentication request and terminates the session. Otherwise, it accepts the operator as a legitimate entity.
  • Step 4: The RA generates random number R4  Z r * and secret key S K 2 , followed by the computation of security parameters C3 = (R4.ℙ) and C4 = (R4.B1) and session key S S K R A = h(IDOP||IDRA||B1||C3||C1||A2||C4), which its shares with the operator. Next, the RA retrieves the R1 corresponding to this particular IDUAV followed by the derivation of secret tokens A1 = h(IDUAV||SKRA||R1) and C5 = h(IDOP||IDUAV||IDRA||C4|| S K 2 ). Next, the RA computes D1 = E A 1 (IDOP||IDUAV||IDRA||C5|| S K 1 | | S K 2 ) and D2 = h(IDOP||IDUAV||IDRA||C5|| S K 1 | | S K 2 ||A1). Finally, it constructs message M2 = {D1, D2}, which is then sent to the UAV over insecure channels.
  • Step 5: After receiving message M2 from the RA, the UAV decrypts security parameter D1 using its secret key A1. This is followed by the derivation of parameters D2* = h(IDOP||IDUAV||IDRA||C5|| S K 1 | | S K 2 ||A1). It then checks if D2* ≟ D2 such that the session is terminated when these two values are dissimilar. Otherwise, the UAV generates random number R5 Z r * before computing session key S S K U A V = h(IDUAV||IDRA|| S K 2 ||R5||A1), which it shares with the RA. Next, it derives session key S S K O P = h (IDOP||IDUAV|| IDRA||C5|| S K 1 | | R 5 ), which it shares with the operator. This is followed by the derivation of D3 = h(IDOP||IDUAV||IDRA||C5|| S K 2 | | R 5 ||A1) before constructing message M3 = {R5, D3}, which is transmitted over to the RA.
  • Step 6: Upon receiving message M3, the RA derives D3* = h(IDOP||IDUAV||IDRA||C5|| S K 2 | | R 5 ||A1), which it deploys to validate the UAV’s identity. As such, it checks if D3* ≟ D3 such that the session is terminated if the two parameters are not identical. Otherwise, it computes S S K U A V = h(IDUAV||IDRA|| S K 2 ||R5||A1), which is shared with the UAV. This is followed by the derivation of security parameter D4 = h(IDOP||IDRA||C3||C1||A2||C4|| S K 1 || S K 2 ||R5), which is utilized to validate its own identity on the UAV operator side. Finally, it constructs message M4 = {C3, D4, S K 2 , R 5 }, which it transmits over to the operator.
  • Step 7: After receiving message M4 from the RA, the operator computes C4 = (R3.C3), D4* = h(IDOP||IDRA||C3||C1||A2||C4|| S K 1 || S K 2 ||R5) to validate the RA’s legitimacy. As such, it checks if D4* ≟ D4 and terminates the session when these two values are dissimilar. Otherwise, it derives security parameter C5 = h(IDOP||IDUAV||IDRA||C4|| S K 2 ); session key S S K R A = h(IDOP||IDRA||B1||C3||C1||A2||C4), which it shares with the RA; and session key S S K O P = h(IDOP||IDUAV||IDRA||C5|| S K 1 | | R 5 ) .

3.4. Parameter Update Phase

The proposed protocol offers some mechanisms through which the UAV operator may update the deployed biometrics and password. This is crucial, especially if these security parameters are compromised by an adversary. This is a three-step process, as discussed below.
  • Step 1: The operator inserts the smart card into the card reader and inputs security parameters {IDOP*, PWOP*, β*}. Afterwards, the SC computes βk* = Fe(βT, β*), VF* = h(h(IDOP*||PWOP*||βk*) mod CP). Next, it checks whether VF* ≟ VF such that the session is terminated if the two values do not match. Otherwise, it derives A2* = A2 h(IDOP*||PWOP*||βk*) and A3* = A5 h(IDOP* PWOP* βk*).
  • Step 2: The operator generates a new password PWOPNew and inputs new biometrics βNew. Upon receiving updated parameters PWOPNew and βNew, the smart card computes (βkNew, βTNew) = Gen(βNew), A4New = A2 h(IDOP*||PWOPNew||βkNew), A5New = A3 h(IDOP* PWOPNew βkNew), and VFNew = h(h(IDOP*|| PWOPNew||βkNew) mod CP).
  • Step 3: The smart card substitutes security parameters {A4, A5, VF, βT} with their updated equivalents {A4New, A5New, VFNew, βTNew}.

3.5. Smart Card Revocation Phase

This phase is invoked whenever the UAV operator loses the smart card or the security tokens stored in it are compromised in any way.
  • Step 1: The UAV operator generates new identity IDOP** and pseudonym PIDOP**, which are then sent to the RA over secure channels.
  • Step 2: Upon receiving these operator credentials, the RA validates their authenticity such that the revocation request is rejected if they are invalid. Otherwise, the RA generates random number R2New and derives parameters A2 = h(IDOP**||SKRA||R2New) and A3 = h(IDSCNew||SKRA). Next, the RA substitutes previous security parameter set {IDOP, IDSC, R2, PIDOP} with updated parameter set {IDOP**, IDSCNew, R2New, PIDOP**}.
  • Step 3: After the parameter updates in step 2 above, the operator executes the rest of the registration steps as detailed in the registration phase above.

4. Security Evaluation

In this section, a number of theorems are formulated and proved to demonstrate the resilience of the proposed protocol against attacks. A similar approach is followed to illustrate the many salient privacy and security features provided by our scheme.
Theorem 1.
The proposed protocol is robust against smart card loss and side-channeling attacks.
Proof. 
Suppose that an adversary wants to mount offline password guessing attacks against the proposed protocol. To achieve this, the security parameters {A4, A5, VF, ℙ, PUKRA, CP, h(.),Gen(.), Fe(.)} stored in the smart card are extracted. Here, (βk, βT) = Gen(β) and VF = h(h(IDOP||PWOP||βk) mod CP). As such, even if an adversary manages to compromise the smart card and operator biometrics, the operator identity IDOP* and password PWOP* still need to be correctly guessed. Obtaining these security parameters from the fuzzy verifier is difficult due to the one-way hashing operation. Consequently, any bogus identity IDOPbogus and password PWOPbogus will be detected when the operator checks if VF* ≟ VF, where VF* = h(h(IDOPbogus||PWOPbogus ||βk*) mod CP). Suppose now that an attacker has captured message M1 = {B3, C2, S K 1 } sent from the operator towards the RA. Here, A4 = A2 h(IDOP||PWOP||βk), A5 = A3 h(IDOP PWOP βk), B3 = (A2.ℙ + B1.B2), and C2 = E C 1 (IDOP||B1||B5||IDUAV). Using parameters A4 and A5 extracted from the smart card, the attacker derives A2* = A4 h(IDOP*||PWOP*||βk*), A3* = A5 h(IDOP* PWOP* βk*), and B5* = h(IDOP*||A2*||A3*|| S K 1 ). However, based on the elliptic curve computational Diffie–Hellman (ECCDH) difficulty, the attacker is unable to compute B5 = h(IDOP||A2||A3|| S K 1 ) from C2 = E C 1 (IDOP||B1||B5||IDUAV). As such, the adversary is unable to derive B5, which is required to effectively authenticate IDOP* and PWOP*. □
Theorem 2.
Strong mutual authentication is executed in the proposed scheme.
Proof. 
To authenticate the operator, the RA verifies whether B5* ≟ B5 and B3* ≟ B3, where B5 = h(IDOP||A2||A3|| S K 1 ) and B3 = (A2.ℙ + B1.B2). As such, an entity masquerading as the operator must derive a valid B3 and B5. However, an adversary is unable to derive these parameters without the operator identity IDOP, password PWOP, or parameters A4 and A5 stored in the smart card. On the other hand, the UAV authenticates the RA through the verification of whether D2* ≟ D2, where D2 = h(IDOP||IDUAV||IDRA||C5|| S K 1 | | S K 2 ||A1). Since security parameter A1 = h(IDUAV||SKRA||R1) is only known to the UAV and RA, an attacker is unable to obtain authentication. Similarly, the RA authenticates the UAV by verifying whether D3* ≟ D3, where D3 = h(IDOP||IDUAV||IDRA||C5|| S K 2 | | R 5 ||A1), while the operator authenticates the RA by checking if D4 = h(IDOP||IDRA||C3||C1||A2||C4|| S K 1 || S K 2 ||R5). The derivation of a valid D4 requires secrets SKRA and A2, among others. Similarly, secrets PKRA and SKRA, which are only known to the RA and the operator, are also required. □
Theorem 3.
The proposed protocol offers UAV operator untraceability.
Proof. 
Suppose that an adversary is interested in tracking a particular UAV operator. To achieve this, authentication messages exchanged in the channels must be intercepted. Thereafter, an attempt is made to associate the various communication sessions with the operator. During the authentication phase, messages M1 = {B3, C2, S K 1 } and M4 = {C3, D4, S K 2 , R 5 } both relate to the UAV operator. Here, B3 = (A2.ℙ + B1.B2), B1 = (R3.ℙ), C2 = E C 1 (IDOP||B1||B5||IDUAV), C3 = (R4.ℙ), and D4 = h(IDOP||IDRA||C3||C1||A2||C4|| S K 1 || S K 2 ||R5). Evidently, random numbers R3, R4, and R5 imply that these messages are stochastic and hence session-specific. As such, it is infeasible to associate any two or more sessions with a particular operator. □
Theorem 4.
Online password guessing attacks are curbed in the proposed protocol.
Proof. 
During the login phase, the UAV operator inputs password PWOP*, identity IDOP*, and biometrics β*. Afterwards, the fuzzy verifier is derived as VF* = h(h(IDOP*||PWOP*||βk*) mod CP). The computed verifier is then validated against the fuzzy verifier VF = h(h(IDOP||PWOP||βk) mod CP) stored in the smart card. As such, any adversarial password guesses are easily detected, and the session is immediately terminated. □
Theorem 5.
The proposed protocol facilitates the negotiation of session keys.
Proof. 
During the authentication process, the operator and RA establish a session key S S K R A = h(IDOP||IDRA||B1||C3||C1||A2||C4). Evidently, the derivation of this session key requires secrets C1, C4, and A2, which are only known to the UAV operator and the RA. On the other hand, the session key S S K O P = h(IDOP||IDUAV||IDRA||C5|| S K 1 | | R 5 ) is negotiated between the operator and the UAV. The derivation of this session key requires secret C5, which is only known to the operator and the UAV. Similarly, session key S S K U A V = h(IDUAV||IDRA|| S K 2 ||R5||A1) is established between the UAV and the RA using secret A1, which is only known to the UAV and the RA. □
Theorem 6.
UAV operator anonymity is upheld in the proposed protocol.
Proof. 
Suppose that an attacker is interested in deciphering the operator identity IDOP. To attain this goal, all the messages exchanged between the operator and other entities are captured. For instance, in message M1 = {B3, C2, S K 1 }, operator identity is masked and enciphered in C2 = E C 1 (IDOP||B1||B5||IDUAV). As such, to obtain this identity IDOP, an adversary must access secret key C1 = h(B4||B3||IDRA) to decrypt C2. Another technique is to deploy the RA’s private key PKRA to derive B4 = PKRAB3. However, this is infeasible, since this private key is only known to the RA. Similarly, for the attacker to obtain identity IDOP, secret values R3 and A2 must be obtained so as to derive B4 = E P U K R A (A2 + R3B2). However, this presents a difficult ECCDH problem. In addition, security parameter A2 is masked with password PWOP and biometrics β in the smart card and hence is difficult to obtain. □
Theorem 7.
The proposed protocol offers easy recovery from smart card loss.
Proof. 
Suppose that the UAV operator’s smart card is stolen or lost, along with the credentials stored in it. However, the RA stores security parameters {IDOP, IDSC, R2, PIDOP} in its database. As such, the operator only needs to invoke the smart card revocation phase of this protocol, at which point the value of IDSC is updated without changing identity IDOP.
Theorem 8.
The security of the negotiated session key is upheld in this protocol.
Proof. 
During the generation of the session key S S K R A = h(IDOP||IDRA||B1||C3||C1||A2||C4) that is shared between the operator and the RA, session-specific parameters B1 = (R3.ℙ) and C3 = (R4.ℙ) are deployed. This is because these parameters are stochastically selected for each authentication session. As such, even if the session key is compromised by an adversary, secret values C1 and A2 cannot be obtained due to the irreversibility of the one-way hashing operation. Consequently, an attacker is unable to derive the session key for the subsequent communication process. Similarly, an adversary is unable to derive C5 in S S K O P = h(IDOP||IDUAV||IDRA||C5|| S K 1 | | R 5 ), and hence this session key also remains secure in other sessions even if the current key is under attack. □
Theorem 9.
UAV operator biometric privacy is preserved and impersonation prevented.
Proof. 
Once the operator imprints the biometric data β, the processing is carried out locally on the operator side such that the RA cannot access any information related to β. In addition, before storage in the smart card, a biometric encryption algorithm is executed to convert it into hash values as (βk, βT) = Gen(β), A4 = A2 h(IDOP||PWOP||βk), A5 = A3 h(IDOP PWOP βk), and fuzzy verifier VF = h(h(IDOP||PWOP||βk) mod CP). As such, the operator biometrics appear as A4, A5, VF, and βT in the smart card. Consequently, even if the current biometric information in the smart card is leaked, an attacker is unable to derive β from the leaked information. Consequently, operator impersonation using β is thwarted. □
Theorem 10.
Privileged insider attack is prevented.
Proof. 
This attack normally happens when certain entities take advantage of their higher security clearance levels and attempt to compromise the communication process. During these compromises, security parameters such as unique identities and passwords may be recovered and misused. To curb this attack, the operator only transmits identity to the registration authority (RA) during the UAV operator registration phase. As such, the registration authority is never allowed to access any information that may facilitate the recovery of the operator password. □
Theorem 11.
The proposed protocol achieves forward key secrecy.
Proof. 
At any authentication and communication phase, the UAV operator maintains three long-term secret tokens, A4, PWOP, and β, where A4 = A2 h(IDOP||PWOP||βk). On the other hand, the registration authority (RA) maintains two long-term secret tokens, PKRA and SKRA. In addition, for the generation of the shared session keys S S K R A = h(IDOP||IDRA||B1||C3||C1||A2||C4), S S K U A V = h(IDUAV||IDRA|| S K 2 ||R5||A1), and S S K O P = h(IDOP||IDUAV|| IDRA||C5|| S K 1 | | R 5 ), random parameters R3, R4, and R5 have to be dynamically generated. Here, it is infeasible to compute C4 = (R4.B1) with B1 = (R3.ℙ) due to the difficulty of solving the ECCDH problem. Consequently, the exposure of these long-term secrets cannot compromise the security of the negotiated session keys. □
Theorem 12.
Denial-of-service attacks are thwarted.
Proof. 
In the proposed protocol, the registration authority (RA) does not need to maintain a verifier table that will be searched for verification tokens during the authentication process. On the other hand, the RA only stores parameter set {IDOP, IDSC, R2, PIDOP} in its database. Since none of these parameters are derived from the UAV operator passwords, there is no need for an exhaustive search for verification tokens in tables. Schemes using verifier tables are vulnerable to denial-of-service attacks when this table is compromised. □
Theorem 13.
Ephemeral leakage and MitM attacks are prevented.
Proof. 
The assumption made in this attack is that intermediary security parameter R3 Z r * has been captured by an adversary. As such, the attacker may attempt to derive session key S S K R A = h(IDOP||IDRA||B1||C3||C1||A2||C4). However, the crucial parameter required for the derivation of this session key is C1 = h(B4||B3||IDRA), in which B4 = E P U K R A (A2 + R3.B2). Evidently, an attacker cannot compute B4 without security parameter A2, which is stored in the smart card and encapsulated in password PWOP and UAV operator biometrics β. □

5. Performance Evaluation

Many authentication protocols have utilized various complexities to appraise their performance. The most common complexities include computation, communication, and storage. As such, this section presents the derivation as well as the comparative evaluation of the proposed protocol using these complexities. In addition, the supported security features and attack resilience are deployed towards the end of this section to appraise the proposed protocol.

5.1. Computation Complexity

During the mutual authentication and key negotiation phase, various cryptographic operations are executed at the RA, smart card reader, and UAV. Specifically, 10 elliptic curve multiplications, 2 elliptic curve additions, 4 symmetric encryptions/decryptions, and 25 one-way hashing operations are executed. Taking the duration of a single elliptic curve multiplication, elliptic curve addition, symmetric encryption/decryption, and one-way hashing operation as TEM, TEA, TSED, and TH, respectively, the total computation complexity of the proposed protocol is 25TH + 10TEM, 2TEA + 4TS. Table 2 presents the implementation environment for the proposed protocol.
Using the parameters in Table 2, above, the duration of each cryptographic operation is presented in Table 3 below.
Based on the cryptographic durations in Table 3 above, the computation complexities for the proposed protocol as well as other related schemes were derived, as shown in Table 4 below. The selection of the schemes in [33,39,51,57] was informed by the fact that these schemes deploy similar symmetric and asymmetric cryptographic operations. As such, it was feasible to carry out some comparative evaluations with the proposed protocol.
As shown in Table 4, the computation complexity of the proposed protocol was 13.625 ms. On the other hand, the schemes in [33,39,51,57] had computation complexities of 38.581 ms, 17.046 ms, 344.728 ms, and 12.234 ms, respectively. It is evident from Figure 4 that the protocol developed in [51] incurred the highest computation complexities.
This was followed by the protocols in [39,57], the proposed protocol, and the scheme in [33], respectively. The extensive computation complexities in [51] were attributed to the many bilinear pairing operations that had to be executed. Although the protocol in [33] yielded the lowest computation complexities, it failed to offer session key agreement and was susceptible to privileged insider, KSSTI, MitM, and packet replay attacks.

5.2. Communication Complexity

In the process of carrying out mutual authentication and key negotiation, four messages are exchanged in the proposed protocol. These messages include M1 = {B3, C2, S K 1 }, M2 = {D1, D2}, M3 = {R5, D3} and M4 = {C3, D4, S K 2 ,   R 5 }. Here, B3 = (A2ℙ + B1B2), C2 = E C 1 (IDOP||B1||B5||IDUAV), D1 = E A 1 (IDOP||IDUAV||IDRA||C5|| S K 1 | | S K 2 ), D2 = h(IDOP||IDUAV||IDRA||C5|| S K 1 | | S K 2 ||A1), D3 = h(IDOP||IDUAV||IDRA||C5|| S K 2 | | R 5 ||A1), C3 = (R4.ℙ), and D4 = h(IDOP||IDRA||C3||C1||A2||C4|| S K 1 || S K 2 ||R5). Using the values in [18,59], Table 5 presents the sizes of the various cryptographic outputs.
Based on the cryptographic output sizes in Table 5 above, the derivation of the communication complexity of the proposed protocol is illustrated in Table 6 below.
As shown in Table 6 above, the total communication complexity was 1888 bits. Table 7 below offers a comparative evaluation of the obtained communication complexity with those of other related protocols.
As shown in Table 7, the schemes in [33,39,51,57] incurred communication complexities of 4128 bits, 2294 bits, 3648 bits, and 1120 bits, respectively. It is evident from Figure 5 that the protocol in [57] incurred the highest communication complexities and required the highest number of message exchanges. This was followed by the protocol in [51], even with its two message exchanges.
The protocol in [39] had the third highest communication complexity even though it required only three message exchanges. Although the scheme in [33] had the lowest communication complexity, it could not provide session key agreement. In addition, it was prone to attacks such as privileged insider, KSSTI, MitM, and packet replays. Figure 6 shows the comparative evaluation based on the number of message exchanges.
As shown in Figure 6, the protocol in [57] required five messages to be exchanged during the authentication and key negotiation phase. This was followed by the proposed protocol, with four message exchanges. On the other hand, the scheme in [39] required three message to be exchanged, while the protocols in [33,51] needed only two messages to be exchanged. This low number of message exchanges was attributed to the lack of mutual authentication in [51] and the lack of session key agreement in [33].

5.3. Storage Complexity

In our scheme, the RA stores parameter set {IDUAV, R1, IDOP, IDSC, R2, PIDOP} in its database during the registration phase. On the other hand, the UAV stores parameter A1 in its memory, while the smart card stores {A2, A3, ℙ, PUKRA, CP, h(.), Gen(.), Fe(.), IDOP, PWOP, β, A4, A5, VF, βT} during the registration phase. Here, A1 = h(IDUAV||SKRA||R1), A2 = h(IDOP||SKRA||R2), A3 = h(IDSC||SKRA), PUKRA = ℙ.PKRA, A4 = A2 h(IDOP||PWOP||βk), A5 = A3 h(IDOP PWOP βk), and VF = h(h(IDOP||PWOP||βk) mod CP). Using the values in [14,35], IDUAV = IDOP = IDSC = PIDOP = PWOP = β = βT = CP = Gen(.) = Fe(.) = 32 bits, R1 = R2 = 128 bits, A1 = A2 = A3 = A4 = A5 = h(.) = VF =160 bits, and ℙ = PUKRA = 320 bits. As such, the storage complexities at the RA, UAV, and smart card are 384 bits, 160 bits, and 1824 bits, respectively. Therefore, the total storage complexity in our protocol is 2368 bits. Table 8 presents a comparative evaluation of the obtained storage complexity in relation to those of other protocols.
As shown in Table 8, the storage complexities of the schemes in [33,39,51,57] were 2496 bits, 1920 bits, 2080 bits, and 2608 bits, respectively. It is evident from Figure 7 that the protocol in [57] incurred the highest storage complexity. This was followed by the protocol in [33], the proposed scheme, and the protocols in [39,51], in that order.
Although the protocol in [39] incurred the least storage complexities, it was vulnerable to privileged insider, impersonation, and KSSTI attacks. Similarly, the scheme in [51] incurred relatively low storage complexities but was not robust against side-channeling, impersonation, and privileged insider attacks. In addition, it failed to provide mutual authentication and unlinkability.

5.4. Supported Security Features

In this sub-section, the security features supported by our protocol as well as the resilience it provides are compared to those of other related schemes. Table 9 shows the results of this comparative evaluation.
As shown in Table 9, the schemes in [33,39,51,57] supported six, eight, four, and seven security and privacy features, respectively. On the other hand, the proposed protocol supported all 15 features. As such, using the eight supported features in [39] as a basis, the proposed protocol yielded a 87.5% improvement in privacy and security provision. Although our scheme incurred slightly higher computation, communication, and storage complexities, it was the most robust against attacks and supported the highest number of salient security features.
It was shown that the proposed protocol executed 10 elliptic curve multiplications, which led to slightly high computation complexities. Similarly, the 2368 bits storage requirements and four messages exchanged during the authentication and key agreement phase were slightly higher compared to the other related schemes. However, these high complexities led to the strong security of the proposed protocol, as shown in Table 9 above. Overall, the proposed protocol offers good trade-offs between security and performance.

6. Conclusions

Unmanned aerial vehicles exhibit characteristics such as low cost and flexible operations. This has made them popular for deployment in a myriad of application domains, such as intelligent transportation systems, the detection and collection of environmental data, emergency rescue, autonomous driving, and the creation of high-definition maps in real time as well as in military applications. Clearly, large amounts of sensitive data are collected and exchanged among several ubiquitous devices to realize these services. Unfortunately, message exchanges are accomplished over public channels. This exposes exchanged data to attacks such as impersonation, session key disclosure, message replay, MitM, tracking, and eavesdropping attacks. Although many protocols have been put forward to secure the UAV communication process, a number of them still suffer from security vulnerabilities or exhibit high complexities. The developed scheme was shown to offer features such as untraceability, anonymity, key secrecy, and biometric privacy. In addition, it was demonstrated to withstand numerous attacks, such as password guessing, KSSTI, and privileged insider attacks. The comparative performance evaluation carried out showed that the scheme has relatively lower computation, storage, and communication complexities.

Author Contributions

Conceptualization, K.A.-A.M.; Methodology, V.O.N. and Z.A.A.; Software, V.O.N. and Z.A.A.; Validation, H.M.J.; Investigation, V.O.N. and I.Q.A.; Resources, K.A.-A.M. and I.Q.A.; Data curation, H.M.J. and D.G.H.; Writing—original draft, Z.A.A.; Writing—review & editing, J.M., I.Q.A. and D.G.H.; Visualization, I.Q.A. and D.G.H.; Supervision, J.M.; Project administration, Z.A.A. and J.M.; Funding acquisition, Z.A.A. and J.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of Top Talent of SZTU (grant No. 20211061010016).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Syed, F.; Gupta, S.K.; Hamood Alsamhi, S.; Rashid, M.; Liu, X. A survey on recent optimal techniques for securing unmanned aerial vehicles applications. Trans. Emerg. Telecommun. Technol. 2021, 32, e4133. [Google Scholar] [CrossRef]
  2. Boccadoro, P.; Striccoli, D.; Grieco, L.A. An extensive survey on the Internet of Drones. Ad Hoc Netw. 2021, 122, 102600. [Google Scholar] [CrossRef]
  3. Zhang, L.; Xu, J.; Obaidat, M.S.; Li, X.; Vijayakumar, P. A PUF-based lightweight authentication and key agreement protocol for smart UAV networks. IET Commun. 2022, 16, 1142–1159. [Google Scholar] [CrossRef]
  4. Son, S.; Kwon, D.; Lee, S.; Jeon, Y.; Das, A.K.; Park, Y. Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems using Blockchain and PUF. IEEE Access 2023, 11, 60240–60253. [Google Scholar] [CrossRef]
  5. Xu, X.; Zhao, J.; Li, Y.; Gao, H.; Wang, X. BANet: A balanced atrous net improved from SSD for autonomous driving in smart transportation. IEEE Sens. J. 2020, 21, 25018–25026. [Google Scholar] [CrossRef]
  6. Li, X.; Tan, J.; Liu, A.; Vijayakumar, P.; Kumar, N.; Alazab, M. A novel UAV-enabled data collection scheme for intelligent transportation system through UAV speed control. IEEE Trans. Intell. Transp. Syst. 2020, 22, 2100–2110. [Google Scholar] [CrossRef]
  7. Khan, M.A.; Ullah, I.; Nisar, S.; Noor, F.; Qureshi, I.M.; Khanzada, F.U.; Amin, N.U. An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network. IEEE Access 2020, 8, 36807–36828. [Google Scholar] [CrossRef]
  8. Calafate, C.T.; Tropea, M. Unmanned Aerial Vehicles—Platforms, Applications, Security and Services. Electronics 2020, 9, 975. [Google Scholar] [CrossRef]
  9. Nyangaresi, V.O.; Ibrahim, A.; Abduljabbar, Z.A.; Hussain, M.A.; Al Sibahee, M.A.; Hussien, Z.A.; Ghrabat, M.J.J. Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges. In Proceedings of the 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, 9–10 December 2021; pp. 1–6. [Google Scholar]
  10. Al Sibahee, M.A.; Nyangaresi, V.O.; Ma, J.; Abduljabbar, Z.A. Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things. In International Conference on Internet of Things as a Service; Springer International Publishing: Cham, Switzerland, 2022; pp. 3–18. [Google Scholar]
  11. Nyangaresi, V.O.; Abduljabbar, Z.A.; Al Sibahee, M.A.; Abduljaleel, I.Q.; Abood, E.W. Towards Security and Privacy Preservation in 5G Networks. In Proceedings of the 2021 29th Telecommunications Forum (TELFOR), Belgrade, Serbia, 23 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [Google Scholar]
  12. Nyangaresi, V.O.; Khalefa, M.S.; Abduljabbar, Z.A.; Al Sibahee, M.A. Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems. In Proceedings of the International Conference on Communication and Computational Technologies; Kumar, S., Hiranwal, S., Purohit, S.D., Prasad, M., Eds.; Algorithms for Intelligent Systems. Springer Nature Singapore: Singapore, 2023; pp. 193–208, ISBN 978-981-19395-0-1. [Google Scholar]
  13. Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-based three-factor mutual authentication protocol for telecare medical information system. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
  14. Wazid, M.; Das, A.K.; Choo, K.K.R.; Park, Y. SCS-WoT: Secure communication scheme for web of things deployment. IEEE Internet Things J. 2021, 9, 10411–10423. [Google Scholar] [CrossRef]
  15. Cho, Y.; Oh, J.; Kwon, D.; Son, S.; Yu, S.; Park, Y.; Park, Y. A secure three-factor authentication protocol for e-governance system based on multiserver environments. IEEE Access 2022, 10, 74351–74365. [Google Scholar] [CrossRef]
  16. Al Sibahee, M.A.; Lu, S.; Abduljabbar, Z.A.; Liu, X.; Abdalla, H.B.; Hussain, M.A.; Hussien, Z.A.; Jassim Ghrabat, M.J. Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System. IEEE Access 2020, 8, 218331–218347. [Google Scholar] [CrossRef]
  17. Nyangaresi, V.O.; Abduljabbar, Z.A.; Abduljabbar, Z.A. Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks. In Proceedings of the 2021 IEEE 2nd International Conference on Signal, Control and Communication (SCC), Tunis, Tunisia, 20 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 188–193. [Google Scholar]
  18. Wazid, M.; Das, A.K.; Lee, J.H. Authentication protocols for the internet of drones: Taxonomy, analysis and future directions. J. Ambient Intell. Humaniz. Comput. 2018, 1–10. [Google Scholar] [CrossRef]
  19. Ilgi, G.S.; Ever, Y.K. Critical analysis of security and privacy challenges for the Internet of drones: A survey. In Drones in Smart-Cities; Elsevier: Amsterdam, The Netherlands, 2020; pp. 207–214. [Google Scholar]
  20. Abualigah, L.; Diabat, A.; Sumari, P.; Gandomi, A.H. Applications, deployments, and integration of internet of drones (iod): A review. IEEE Sens. J. 2021, 21, 25532–25546. [Google Scholar] [CrossRef]
  21. Yahuza, M.; Idris, M.Y.I.; Ahmedy, I.B.; Wahab, A.W.A.; Nandy, T.; Noor, N.M.; Bala, A. Internet of drones security and privacy issues: Taxonomy and open challenges. IEEE Access 2021, 9, 57243–57270. [Google Scholar] [CrossRef]
  22. Tan, H.; Zheng, W.; Vijayakumar, P. Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs. IEEE Trans. Intell. Transp. Syst. 2023, 24, 6389–6400. [Google Scholar] [CrossRef]
  23. Liu, R.; Liu, A.; Qu, Z.; Xiong, N.N. An UAV-enabled intelligent connected transportation system with 6G Communications for internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 24, 2045–2059. [Google Scholar] [CrossRef]
  24. Bai, L.; Liu, J.; Wang, J.; Han, R.; Choi, J. Data aggregation in UAV-aided random access for Internet of Vehicles. IEEE Internet Things J. 2021, 9, 5755–5764. [Google Scholar] [CrossRef]
  25. Wang, W.; Han, Z.; Alazab, M.; Gadekallu, T.R.; Zhou, X.; Su, C. Ultra super fast authentication protocol for electric vehicle charging using extended chaotic maps. IEEE Trans. Ind. Appl. 2022, 58, 5616–5623. [Google Scholar] [CrossRef]
  26. Aydin, Y.; Kurt, G.K.; Ozdemir, E.; Yanikomeroglu, H. Authentication and handover challenges and methods for drone swarms. IEEE J. Radio Freq. Identif. 2022, 6, 220–228. [Google Scholar] [CrossRef]
  27. Jan, S.U.; Abbasi, I.A.; Algarni, F. A key agreement scheme for IoD deployment civilian drone. IEEE Access 2021, 9, 149311–149321. [Google Scholar] [CrossRef]
  28. Gao, H.; Liu, C.; Li, Y.; Yang, X. V2VR: Reliable hybrid-network-oriented V2V data transmission and routing considering RSUs and connectivity probability. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3533–3546. [Google Scholar] [CrossRef]
  29. Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
  30. Muram, F.U.; Javed, M.A. Drone-based risk management of autonomous systems using contracts and blockchain. In Proceedings of the 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, HI, USA, 9–12 March 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 679–688. [Google Scholar]
  31. Nyangaresi, V.O. Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks. Ad Hoc Netw. 2023, 142, 103117. [Google Scholar] [CrossRef]
  32. Alladi, T.; Bansal, G.; Chamola, V.; Guizani, M. SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Trans. Veh. Technol. 2020, 69, 15068–15077. [Google Scholar] [CrossRef]
  33. Yang, X.; Yi, X.; Khalil, I.; Zeng, Y.; Huang, X.; Nepal, S.; Cui, H. A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun. 2019, 15, 16–27. [Google Scholar] [CrossRef]
  34. Jan, S.U.; Qayum, F.; Khan, H.U. Design and analysis of lightweight authentication protocol for securing IoD. IEEE Access 2021, 9, 69287–69306. [Google Scholar] [CrossRef]
  35. Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J. Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet Things J. 2018, 6, 3572–3584. [Google Scholar] [CrossRef]
  36. Nyangaresi, V.O.; Petrovic, N. Efficient PUF based authentication protocol for internet of drones. In Proceedings of the 2021 International Telecommunications Conference (ITC-Egypt), Alexandria, Egypt, 13 July 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [Google Scholar]
  37. Alzahrani, B.A.; Barnawi, A.; Chaudhry, S.A. A resource-friendly authentication protocol for UAV-based massive crowd management systems. Secur. Commun. Netw. 2021, 2021, 3437373. [Google Scholar] [CrossRef]
  38. Gope, P.; Sikdar, B. An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Trans. Veh. Technol. 2020, 69, 13621–13630. [Google Scholar] [CrossRef]
  39. Tan, Z. Privacy-preserving two-factor key agreement protocol based on chebyshev polynomials. Secur. Commun. Netw. 2021, 2021, 6697898. [Google Scholar] [CrossRef]
  40. Khan, M.A.; Ullah, I.; Alkhalifah, A.; Rehman, S.U.; Shah, J.A.; Uddin, M.I.; Algarni, F. A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems. IEEE Trans. Ind. Inform. 2021, 18, 3416–3425. [Google Scholar] [CrossRef]
  41. Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 2019, 48, 102354. [Google Scholar] [CrossRef]
  42. Khalid, H.; Hashim, S.J.; Ahamed, S.M.S.; Hashim, F.; Chaudhary, M.A. Secure Real-Time Data Access Using Two-Factor Authentication Scheme for the Internet of Drones. In Proceedings of the 2021 IEEE 19th Student Conference on Research and Development (SCOReD), Kota Kinabalu, Malaysia, 23–25 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 168–173. [Google Scholar]
  43. Tanveer, M.; Zahid, A.H.; Ahmad, M.; Baz, A.; Alhakami, H. LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of Drone environment. IEEE Access 2020, 8, 155645–155659. [Google Scholar] [CrossRef]
  44. Bera, B.; Saha, S.; Das, A.K.; Kumar, N.; Lorenz, P.; Alazab, M. Blockchain-envisioned secure data delivery and collection scheme for 5g-based iot-enabled internet of drones environment. IEEE Trans. Veh. Technol. 2020, 69, 9097–9111. [Google Scholar] [CrossRef]
  45. Nyangaresi, V.O. Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. J. Syst. Archit. 2022, 133, 102763. [Google Scholar] [CrossRef]
  46. Nikooghadam, M.; Amintoosi, H.; Islam, S.H.; Moghadam, M.F. A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. J. Syst. Archit. 2021, 115, 101955. [Google Scholar] [CrossRef]
  47. Zhang, J.; Cui, J.; Zhong, H.; Bolodurina, I.; Liu, L. Intelligent drone-assisted anonymous authentication and key agreement for 5G/B5G vehicular ad-hoc networks. IEEE Trans. Netw. Sci. Eng. 2020, 8, 2982–2994. [Google Scholar] [CrossRef]
  48. Tanveer, M.; Kumar, N.; Hassan, M.M. RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones. IEEE Internet Things J. 2021, 9, 1339–1353. [Google Scholar] [CrossRef]
  49. Abduljabbar, Z.A.; Omollo Nyangaresi, V.; Al Sibahee, M.A.; Jassim Ghrabat, M.J.; Ma, J.; Qays Abduljaleel, I.; Aldarwish, A.J. Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks. J. Sens. Actuator Netw. 2022, 11, 55. [Google Scholar] [CrossRef]
  50. Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J. TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment. IEEE Trans. Veh. Technol. 2019, 68, 6903–6916. [Google Scholar] [CrossRef]
  51. Shao, J.; Lin, X.; Lu, R.; Zuo, C. A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 2015, 65, 1711–1720. [Google Scholar] [CrossRef]
  52. Semal, B.; Markantonakis, K.; Akram, R.N. A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In Proceedings of the 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), London, UK, 23–27 September 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
  53. El-Zawawy, M.A.; Brighente, A.; Conti, M. Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 2022, 20, 1775–1789. [Google Scholar] [CrossRef]
  54. Cheng, Y.; Xu, S.; Zang, M.; Kong, W. LPPA: A lightweight privacy-preserving authentication scheme for the internet of drones. In Proceedings of the 2021 IEEE 21st International Conference on Communication Technology (ICCT), Tianjin, China, 13–16 October 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 656–661. [Google Scholar]
  55. Hussien, Z.A.; Abdulmalik, H.A.; Hussain, M.A.; Nyangaresi, V.O.; Ma, J.; Abduljabbar, Z.A.; Abduljaleel, I.Q. Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems. Appl. Sci. 2023, 13, 691. [Google Scholar] [CrossRef]
  56. Ever, Y.K. A secure authentication scheme framework for mobile-sinks used in the internet of drones applications. Comput. Commun. 2020, 155, 143–149. [Google Scholar] [CrossRef]
  57. Zhou, Z.; Wang, P.; Li, Z. A quadratic residue-based RFID authentication protocol with enhanced security for TMIS. J. Ambient. Intell. Humaniz. Comput. 2019, 10, 3603–3615. [Google Scholar] [CrossRef]
  58. Gao, H.; Huang, W.; Yang, X. Applying Probabilistic Model Checking to Path Planning in an Intelligent Transportation System Using Mobility Trajectories and Their Statistical Data. Intell. Autom. Soft Comput. 2019, 25, 547–559. [Google Scholar] [CrossRef]
  59. Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
Figure 1. Network model.
Figure 1. Network model.
Electronics 12 03688 g001
Figure 2. System initialization and registration phases.
Figure 2. System initialization and registration phases.
Electronics 12 03688 g002
Figure 3. Authentication and key negogiation phase.
Figure 3. Authentication and key negogiation phase.
Electronics 12 03688 g003
Figure 4. Computation complexity comparisons.
Figure 4. Computation complexity comparisons.
Electronics 12 03688 g004
Figure 5. Communication complexity comparisons.
Figure 5. Communication complexity comparisons.
Electronics 12 03688 g005
Figure 6. Message volume comparisons.
Figure 6. Message volume comparisons.
Electronics 12 03688 g006
Figure 7. Storage complexity comparison.
Figure 7. Storage complexity comparison.
Electronics 12 03688 g007
Table 1. Symbols.
Table 1. Symbols.
SymbolDescription
EX (Z)Cipher text of message Z with key X
S S K R A Session key shared between RA and operator
CAGCyclic additive group of the order r
The generator of CAG
SKRARA secret key
PKRARA private key
PUKRARA public key
h(.)Hashing operation
IDRARA unique identity
IDUAVUAV identity
S S K U A V Session key shared between RA and the UAV
RiRandom numbers
IDOPUAV operator unique identity
PIDOPUAV operator pseudonym
IDSCSmart card unique serial number
S S K O P Session key shared between the operator and the UAV
PWOPUAV operator password
βOperator biometrics
βkBiometrics key
VFFuzzy verifier
||Concatenation operation
XOR operation
Table 2. Implementation environment.
Table 2. Implementation environment.
FeatureDescription
ProcessorIntel (R) core (TM) i5-4210U CPU
RAM4 GB
Clock speed2.4 GHz
Operating systemUbuntu 22.04.2 LTS
Programming languagePython
Cryptographic libraryPyCrypto
Symmetric encryption and decryption algorithmAdvanced Encryption Standard (AES)
Asymmetric encryption and decryption algorithmRivest–Shamir–Adleman (RSA)
Table 3. Duration of cryptographic operations.
Table 3. Duration of cryptographic operations.
Cryptographic OperationTime (ms)
One-way hashing (TH)0.043
Modular squaring (TMS)1.865
Square-root modular P (TSQ)3.354
Symmetric encryption/decryption (TS)0.485
Asymmetric encryption/decryption (TA)8.736
Chebyshev polynomial computing (TCP)5.284
Bilinear pairing operation (TBP)12.263
Exponential operation (TE)8.561
Map-to-point hash function operation (TMH)6.782
Montgomery operation (TM)0.285
Hashed message authentication code (THM)0.193
Elliptic curve multiplication (TEM)1.029
Elliptic curve addition (TEA)0.016
Table 4. Computation complexity comparisons.
Table 4. Computation complexity comparisons.
SchemeOperationsTime (ms)
Yang et al. [33]12TH + 4TM + 2TSQ + 4TS + 10THM12.234
Tan [39]18TH + TMS + TSQ + 2TCP + TS17.046
Shao et al. [51]13TBP + 17TE + 2TMH + 3TA344.728
Zhou et al. [57]13TH + 6TMS + 8TSQ38.581
Proposed25TH + 10TEM + 2TEA + 4TS13.625
Table 5. Cryptographic output sizes.
Table 5. Cryptographic output sizes.
Cryptographic OperationSize (bits)
Random nonce128
Hash output160
Identity32
Elliptic curve point320
Modular exponentiation1024
Timestamp32
Symmetric encryption/decryption128
Table 6. Communication complexity derivation.
Table 6. Communication complexity derivation.
MessageSize (bits)
M1 = {B3, C 2 ,   S K 1 }
B3 = 320, C2 = S K 1 = 128
576
M2 = {D1, D2}
D1 = 128, D2 = 160
288
M3 = {R5, D3}
R5 = 128, D3 = 160
288
M 4 = { C 3 ,   D 4 ,   S K 2 ,   R 5 }
C 3 = 320 ,   D 4 = 160 ,   S K 2 = R 5 = 128
736
Total1888
Table 7. Communication complexity comparisons.
Table 7. Communication complexity comparisons.
SchemeNo. of Exchanged MessagesSize (bits)
Yang et al. [33]21120
Tan [39]32294
Shao et al. [51]23648
Zhou et al. [57]54128
Proposed41888
Table 8. Storage complexity comparison.
Table 8. Storage complexity comparison.
SchemeSize (bits)
Yang et al. [33]2608
Tan [39]1920
Shao et al. [51]2080
Zhou et al. [57]2496
Proposed2368
Table 9. Security feature comparison.
Table 9. Security feature comparison.
[57][39][51][33]Proposed
Security features
Mutual authentication×
Session key agreement-×
Untraceability--
Anonymity
Forward key secrecy
Backward key secrecy
Biometric privacy----
Attack Resilience
Smart card loss---
Password guessing---
Privileged insider××××
KSSTI×× ×
Side-channeling--×-
Impersonation××
Denial of service---
MitM×××
Key √: supported; ×: not supported; -: not considered.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nyangaresi, V.O.; Jasim, H.M.; Mutlaq, K.A.-A.; Abduljabbar, Z.A.; Ma, J.; Abduljaleel, I.Q.; Honi, D.G. A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles. Electronics 2023, 12, 3688. https://doi.org/10.3390/electronics12173688

AMA Style

Nyangaresi VO, Jasim HM, Mutlaq KA-A, Abduljabbar ZA, Ma J, Abduljaleel IQ, Honi DG. A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles. Electronics. 2023; 12(17):3688. https://doi.org/10.3390/electronics12173688

Chicago/Turabian Style

Nyangaresi, Vincent Omollo, Hend Muslim Jasim, Keyan Abdul-Aziz Mutlaq, Zaid Ameen Abduljabbar, Junchao Ma, Iman Qays Abduljaleel, and Dhafer G. Honi. 2023. "A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles" Electronics 12, no. 17: 3688. https://doi.org/10.3390/electronics12173688

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop