Next Article in Journal
Drone Applications Fighting COVID-19 Pandemic—Towards Good Practices
Next Article in Special Issue
A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones
Previous Article in Journal
SuSy-EnGaD: Surveillance System Enhanced by Games of Drones
Previous Article in Special Issue
Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET

1
Department of ECE, GMR Institute of Technology, Rajam, Srikakulam 532127, Andhra Pradesh, India
2
Artificial Intelligence Engineering Department, Research Center for AI and IoT, AI and Robotics Institute, Near East University, Mersin 10, Turkey
3
University of Waterloo, Waterloo, ON N2L 3G1, Canada
4
Computer Science Department, University of Camerino, 62032 Camerino, Italy
*
Author to whom correspondence should be addressed.
Drones 2022, 6(1), 14; https://doi.org/10.3390/drones6010014
Submission received: 13 December 2021 / Revised: 5 January 2022 / Accepted: 5 January 2022 / Published: 7 January 2022

Abstract

:
As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a result, new technologies between user/control station and UAVs have been developed. FANET (Flying Ad-Hoc Network) is a subset of the MANET (Mobile Ad-Hoc Network) that includes UAVs. UAVs, simply called drones, are used for collecting sensitive data in real time. The security and privacy of these data are of priority importance. Therefore, to overcome the privacy and security threats problem and to make communication between the UAV and the user effective, a competent anonymous mutual authentication scheme is proposed in this work. There are several methodologies addressed in this work such as anonymous batch authentication in FANET which helps to authenticate a large group of drones at the same time, thus reducing the computational overhead. In addition, the integrity preservation technique helps to avoid message alteration during transmission. Moreover, the security investigation section discusses the resistance of the proposed work against different types of possible attacks. Finally, the proposed work is related to the prevailing schemes in terms of communication and computational cost and proves to be more efficient.

1. Introduction

Aerial drone technology may be utilized for a variety of reasons to improve our lives due to its rapid invention and modification as well as the shrinking of integrated sensors, CPU processing speed, and widespread connectivity of wireless systems. Moreover, UAVs are known as drones used in numerous applications ranging from civilian to military platforms [1]. There has been a significant improvement in the number of drone applications, as the advancement in drone technology increases. Drone application in the field of the military is boundless, as they are a vital asset on the modern battlefield. Internet-connected drones provide accurate and efficient flying strategies to ensure the quality of service. Using the drone’s sensors, the assigning field’s physical parameters are collected [2]. In addition, the drone’s cameras and microphones transmit real-time video to the service provider or user via a wireless medium. By controlling a drone, a service provider/user can obtain real-time information from a remote location [3]. A drone’s data collection poses new security and privacy risks as technology advances.
Manpower is saved when the drones are used to deliver packages via airways. Moreover, for short-distance delivery of goods, drones are very obliging. Drones can be used to record video, which was previously impossible due to the need for expensive aircraft and scaffolding to capture the images. The current pandemic situation can be addressed with the help of drones as they are used to transport medicine and necessary items to the contaminated zones. The Internet of Drones (IoD) environment helps to monitor crops and provide the required water facilities frequently, thus helping in smart farming. During the occurrence of any natural calamities, drones will be helpful for collecting the required disaster information. Further, drones are used to monitor a large group of people during public meetings/gatherings as a surveillance and to record the data to guarantee public safety. Drones are not only useful for searching operations but also help to rescue a person in danger from war fields and provide them with food, clothing, and medicine. Moreover, the vital role of safeguarding each country’s border surveillance can be also performed by drones.
In addition to the above-mentioned applications, a drone’s location and other sensitive data are also to be collected and preserved [4]. An adversary can easily intercept the information sent by a drone due to IoD’s public, insecure network connection. Wireless networks are more vulnerable to cyber-attacks than wired networks due to their open nature. To reduce this risk in MANET, predominantly in the IoD environment, various approaches based on single or combined security mechanisms have been proposed. Currently, drones face several issues related to security, privacy, and authentication, which makes them an appealing research topic [5]. IoD is susceptible to several kinds of security attacks. Before exchanging confidential data via an unreliable channel, security precautions should be taken [6]. In this paper, drones are used for providing information related to obstruction on pathways in hilly and other highly populated areas. Roadside infrastructure is desperately required for the sake of safety to help quickly transmit and livestream necessary details about the path ahead in real time. Some of the services that drones can provide include monitoring of low-altitude, disaster relief, and data transmission assistance. It is believed that drones have the greatest potential for providing connectivity and solutions because of their ease of access. A blended wireless protocol is used in mountain ranges and rural places where there are weak signals or interferences. Moreover, if any fault occurs in the current existing drone, it should be replaced with another drone exactly at the same position. Hence, the current location of the drone should be preserved from adversaries.
Authentication and privacy are two of the prevalent security issues with IoD communications [7,8,9]. Drones are attractive targets for adversaries because they are used for sensitive applications. Along with drone data, adversaries may also try to track down geographic location to obtain confidential data. The main challenge is the security between the users and drones during the exchange of information. Due to the open nature of the communication medium, an adversary can read, alter, or respond to the message communicated and send fake information. Moreover, another important vital challenge is to preserve the privacy of the user/drone from an adversary [10]. If the real identity of the drone is revealed, then there may be a possibility for an adversary to perform an impersonation attack and steal the original confidential information of the drone. Though most of the currently existing schemes provide authentication, these are vulnerable to several possible attacks.
Drones are mainly used for aerial surveillance and monitoring operations. During natural disasters and emergency periods, drones play a significant role. The integrity of the collected sensitive data should be preserved without any modification. In addition, privacy of the drone and end user should be preserved. Thus, the main significance of the proposed scheme is that the drone and the end user should be authenticated anonymously without revealing its privacy. Therefore, a simple cryptographic pairing and hashing operations are used for privacy preservation in our work during both mutual and batch authentication. Thus, the computational cost, communication cost, and storage cost are reduced significantly when compared to the prevailing existing works. Moreover, to avoid tracing of the authenticated drones, a location privacy scheme is proposed in this work. The proposed scheme is applicable in the following ways: privacy and anonymity are preserved and the computational cost for verifying a group of drones is significantly reduced. Finally, an intruder will be unable to track the authenticated drones’ location.
The research impact of this manuscript are as follows:
  • To develop a privacy-preserving anonymous mutual authentication scheme between a drone and a user.
  • To authenticate a group of drones anonymously based on batch authentication protocol to reduce the total computational overhead.
  • To ensure the privacy of the confidential information from the authenticated drone to the authenticated user.
  • To guarantee location privacy for the authenticated drones from an adversary.
The systematic flow of a research article is as follows. Section 2 deals with the related prevailing works which deal with security and privacy. The overview of the entire system is described in Section 3. This section describes the basic system model, bilinear pairing, and security measures of the proposed work. Section 4 explains the proposed scheme. This section explains the initialization of the system, registration of the end-user and drone, key exchange protocol, mutual and batch authentication, integrity preservation, and location privacy. Some conceivable security attacks are described in Section 5. Performance analysis is explained in Section 6. This section deals with the analysis of computational cost, communication cost, storage cost, and drone service providing capability. Finally, Section 7 concludes the work.

2. Related Work

Security and privacy are the major concern in the IoD environment [11,12,13,14]. There are many works focused on security issues concerning drones [15], but this work not only discusses the security issues but also focuses on the location privacy of the drones. Turkanovic et al. [16] suggested a mutual authentication framework between the drones and the end-user without the involvement of any third-party node. However, the scheme suffers from several security threats such as the man in the middle attack and the impersonation attack. Amin et al. [17] suggested a strong authentication protocol based on the smart card. However, this scheme suffers from password guessing attacks and damage to smart cards, etc. Challa et al. [18] suggested a signature-based authentication scheme using elliptic curve cryptography (ECC). Though ECC is used in this scheme, this work suffers from increased computational and storage costs for storing the required keys. A certificateless scheme was suggested by Won et al. [19] for the security of drones. In this scheme, three scenarios for communication are taken into consideration. They are one-to-one, many-to-one, and one-to-many communication between drones and smart devices. Moreover, the conditional tracking mechanism is also adopted in this scheme. However, the scheme lacks location privacy and has increased communication cost during batch authentication.
Tai et al. [20] suggested a two-factor authentication scheme. This work is mainly based on user passwords and smart card systems. It generally uses a hash function based on cryptography. However, this work fails to provide resistance against several well-known attacks such as replay attack, privileged-insider attack, etc. Wazid et al. [21] recommended a three-factor authentication scheme. This scheme is based on three parameters such as biometrics, smart card, and password. Though a one-way hash function is used, it lacks conditional tracking and revocability. Yue et al. [22] suggested a technique based on AI for drone surveillance. This work focused on wireless networking protocol. Different features of the drone and the exact location of the drone are traced using this scheme. However, this work does not focus on security issues and latency. Bouman et al. [23] proposed a traveling salesman problem based on a drone. A solution was achieved based on dynamic programming for this problem. The communication cost of this work is significantly lower but it has high computational complexity. Hong et al. [24] suggested a new model of recharging station for the spatial drone. A heuristic algorithm was used in this work which for maximum coverage and to avoid range restriction. There was no analysis regarding the storage cost and security threats. Shavarani et al. [25] proposed an effective method for the delivery of the essential components with less time. A mathematical model based on a biobjective was designed in this work. The drawback of this work is the non-deterministic polynomial time-hard problem and computational complexity. Aggarwal et al. [26] suggested an authentication scheme based on blockchain topology. The framework focuses on etherem based protocol. Though this work ensures privacy and security, the computational complexity of this work is very high. Huang et al. [27] proposed a new method of implementing the charging stations for the drones. A triangular-based approach was used in this work. Moreover, the charging stations with less or no customers were recursively removed. This work does not focus on the communication and storage cost. Shavarani et al.’s [28] work deals with reducing the transportation cost during the delivery time of the goods by drones. A fuzzy logic-based approach was used in this work. Security and privacy concerns were not discussed in this work. Automated swapping of the battery method was suggested by Cokyasar et al. [29]. This work focused on the selection of optimal automated battery swapping machine location and minimized the delivery cost. Although communication cost was reduced in this work, it increased the computational cost. This work does not deal with major security threats. A secure authentication framework was presented from the human-centered industrial internet of things (IIoT) perspective by Singh et al. [30]. When a node first joins the network, a registration hub generates the required credentials for the node. Moreover, nodes are involved in further complex operations such as mutual authentication, exchange of keys, etc., and the registration hub is no longer required to perform these functions. However, this scheme writhes from hefty computational cost, and there is no location privacy. Tian et al. [31] proposed an authentication protocol that integrates both efficiency and security. This framework relies on a compact online/offline signature layout, and it can be deployed on resource-restricted small-scale unmanned aerial vehicles. Moreover, in this work, due to the high mobility of UAVs, the investigation of an extrapolative authentication approach using mobile edge computing (MEC) was performed to decrease authentication costs for possible authentication accomplishments. However, this work suffers from high computational and storage costs.
Gope et al. [32] suggested a scheme that ensures the physical security of the drone. Physically unclonable function and hash operations are used in this scheme. Though the physical security of drones is ensured, it lacks location privacy. Zhang et al. [33] suggested a compact authentication and key agreement (AKA) scheme that relies solely on a one-way secure hash function where drones and users authenticate one another mutually. Though this scheme is robust to different security threats, it lacks location privacy and physical threats. Ever et al. [34] suggested a secure authentication framework based on ECC. Though several potential attacks were defended using this work, it lacks preservation of the location privacy and involves high communication cost. Hussain et al. [35] proposed a three-factor authentication scheme. This work mainly compares the drawback of Wazid et al. [21] but it involved high computational time. Table 1 shows the summary of the different existing approaches.

3. System Overview

In this section, system model, bilinear pairing, and security measures are described in detail.

3.1. System Model

The proposed work’s system model comprises of three major entities, namely, trusted server, end user, and drone [36]. Figure 1 portrays the system model of the proposed work. The role of each entity is described as follows.
Trusted server ( T S )
T S is the key entity in our proposed work. Initialization, secret key generation, drone and end-user registrations are performed by T S . Moreover, unique keys are generated during the key generation process to avoid collision attacks. Initially, both the drone and the end-user should register to the T S through an offline registration. Only after the successful registration, T S provides the required credentials to the drone and end-user.
End-user ( E U i )
E U i is the participant in the FANET network. The required credentials for the E U i to participate in the network are provided by T S . The E U i is able to communicate with the control device of the drone through the specialized equipment with him. This highly sophisticated equipment of E U i is capable of performing the computational operations efficiently. Moreover, the information collected from the controlling device of the drone is stored in the specialized equipment E U i .
Drone ( D j )
The D j is embedded with a control device which has high computational competence. Moreover, specialized sensors are implanted in the controlling device which helps to capture the image of long-distance. The control device of D j is capable of generating the short life session keys during key exchange protocol. In addition, the controlling device of D j is provided with a large storage capability to store the secret keys provided by T S during the initial registration.

3.2. Bilinear Pairing

Let G x ,   G y , and G T be the cyclic multiplicative group of prime order a . Moreover, let e :   G x × G y G T be the asymmetric bilinear map that gratifies the condition
Bi-linearity:  e ( g x p ,   g y q ) = e ( g x , g y ) p q , ( g x , g y ) G x × G y and p ,   q Z a * , where Z a * = [ 1 , 2 , , a 1 ]
Non-degeneracy: ( g x , g y ) G x × G y ,   e ( g x , g y ) 1 .
Computability: The bilinear map e :   G x × G y G T is computable.
No effective isomorphism between G x and G y .

3.3. Security Measures

Four security measures must be met by a proposed system to ensure secure communications in FANET.
Mutual authentication: To protect the FANET system from impersonation attacks, the E U i and controlling device of D j should authenticate each other. Moreover, during the exchange of confidential information from D j to E U i , mutual authentication between vehicle users and RSUs is indispensable.
Exchange of session key: The session key should be shared in an efficient anonymous way between the E U i and D j to maintain confidentiality. Secure communication can be ensured only with the help of the short life session key.
Privacy preservation: The unique identity of E U i and D j should be preserved during the exchange of data. Here, anonymous identity is used during mutual authentication which helps to protect the real identity of both D j and E U i from the adversary.
Performance analysis: This mainly depends on communication and computational cost. The proposed work mainly focuses on a faster message verification time (shorter delay) for the D j with less communication and computational cost.

4. Proposed Scheme

In this article, a proficient anonymous mutual and batch authentication with location privacy is presented. System initialization, E U i registration, D j registration, key exchange, mutual and batch authentication, integrity preservation, and location privacy are the stages in our proposed scheme. Table 2 describes the list of notations and descriptions used in this work.

4.1. System Initialization

The T S selects the master key m   Z a * from a large prime number a . The private key for the T S is chosen as q such that,   Z a *   , where Z a * = [1,2,…,a−1]. Here,   Z a * is the non-zero elements of a finite field Z a and it forms the group under the modulo multiplication a . The corresponding public key for T S is calculated as α t s = g 1 m + q . Here, G 1 ,   G 2 , and G T are the multiplicative cyclic groups and g 1 , g 2 are the corresponding generators of the group G 1 and G 2 , respectively. The secure hash function chosen by T S is H : { 0 , 1 } Z a * and the bilinear mapping is given by e :   G 1 × G 2 G T . Then, the T S publishes the parameters ( G 1 ,   G 2 ,   g 1 ,   g 2 ,   α t s ,   e , H , a ) as the required credentials after computing Z = e ( g 1 , g 2 ) .

4.2. E U i Registration

The E U i provides his required credentials to T S during his initial offline registration. The genuine credentials provided by E U i are verified by T S . Once the offline registration is completed, the private key for the E U i is chosen by T S as u j from the random number such that u j   Z a * . Moreover, the public key and the fake identity for the E U i are calculated as α e u = g 2 1 m + q + u j and F I D e u = g 1 1 ( m + q ) u j , respectively. To perform batch authentication, the E U i batch authentication key is calculated as U B K j = g 2 m + q . Moreover, to trace the exact location of the D j , the T S provides the secret key f , such that f   Z a * to the E U i .

4.3. D j Registration

The T S chooses the private key for the D j as d j such that d j   Z a * . Based on the private key, the public key is calculated as α D j = g 2 1 m + q + d j . The fake identity for the D j is calculated as F I D D j = ( m + q ) 2 d j . During batch authentication process, to authenticate a large number of drones, the drone batch key and the drone tracking key are calculated as D B K j = g 2 m + q + d j and D T K j = g 2 m q , respectively.

4.4. Mutual Authentication

Anonymous mutual authentication must be conceded in an efficient way between the D j and the E U i to perform effective communication. The following steps are to be followed.
Step 1: If an E U i requires a specific service from the D j , then the E U i calculates γ = g 1 u j . Moreover, after calculating the value of γ , the parameters ( γ ,   α e u ,   F I D e u ) are sent to D j .
Step 2: The controlling device in the D j checks e ( γ .   α t s ,   α e u ) = Z . If the condition is gratified, then the E U i request is accepted, else the request from the E U i is rejected.
Proof of correctness
e ( γ .   α t s ,   α e u ) = = e ( g 1 u j .   g 1 m + q ,   g 2 1 m + q + u j )
= e ( g 1 u j + m + q ,   g 2 1 m + q + u j )
= e ( g 1 , g 2 ) = Z
Step 3: Similarly, the controlling device in the D j calculates the value of γ = g 1 d j and sends the parameters ( γ ,   α D j ,   F I D D j ) to the E U i .
Step 4: Then, the E U i checks e ( γ .   α t s ,   α D j ) = Z . If the condition is gratified, the communication with D j is accepted, else it is rejected.
Proof of correctness
e ( γ .   α t s ,   α D j ) = e ( g 1 d j .   g 1 m + q ,   g 2 1 m + q + d j ) = e ( g 1 d j + m + q ,   g 2 1 m + q + d j ) = e ( g 1 , g 2 ) = Z

4.5. Session Key Exchange Protocol

In this phase, session key generation request, session key integrity preservation, and session key exchange are discussed. Once the mutual authentication scheme is successfully performed, the key exchange should be carried out between the D j and E U i . The session key generation request is carried out as follows:
Step 1: Initially, the E U i chooses a random number x such that x   Z a * and calculates s 0 ,   s 1 and s 2 respectively, where s 0 = g 1 ( m + n ) u j , s 1 = ( F I D D j ) x and s 2 = H ( s 0 s 1 x )
Step 2: Finally, E U i sends ( s 0 , s 2 , x , T ) to the D j where T is the timestamp.
Step 3: Initially, the controlling device of D j checks for the validity of the T , if it holds then the controlling device of D j calculates e ( F I D e u , s 0 ) . If e ( F I D e u , s 0 ) = e ( g 1 , g 1 ) , the session key generation request is accepted.
Proof of correctness
e ( F I D e u , s 0 ) = e ( g 1 1 ( m + q ) u j ,   g 1 ( m + q ) u j ) = e ( g 1 , g 1 )
Step 4: Moreover, the integrity of session key is verified by checking s 1 = s 1 . The value of s 1 is calculated by the controlling device of D j as s 1 = F I D D j x .
Step 5: By using s 1 , the value of s 2 = H ( s 0 s 1 x ) is calculated. Thus s 2 = s 2 , then the integrity is preserved, else request is discarded.
Step 6: Once the session key generation request is accepted and session key integrity is preserved, the session key is generated by the controlling device of D j as s k = ( F I D e u ) d j and sends ( s k ,   T 1 ) to E U i .
Step 7: The E U i first checks the validity of the timestamp T 1 . Once, the validity is validated, E U i checks ( s k ) u j . F I D d j = α t s . If the condition is satisfied, then the session key exchange is performed between the E U i and D j for effective communication of data.
Proof of correctness
( s k ) u j · F I D d j = ( ( F I D e u ) d j ) u j · F I D d j = ( ( g 1 1 ( m + q ) u j ) d j ) ( u j · ( m + q ) 2 d j ) = ( g 1 1 ( m + q ) u j ) u j · ( m + q ) 2 = g 1 m + q = α t s

4.6. Batch Authentication

The end user cannot rely on only one D j for gathering the required information. If the E U i requires more data, then a greater number of drones should be authenticated at the same time to reduce the computational cost and to increase the performance. The steps involved in batch authentication are as follows
Step 1: Initially, the controlling device of D j picks a random number c j as its short life private key such that c j   Z a * . The short life public key is calculated as e j = g 2 c j . Moreover, if there are j number of drones, their short life private keys are calculated as c 1 , c 2 , c 3 c j .
Step 2: To make an effective communication, the controlling device of D j calculates E j = g 2 c j d j and F j = E j · D B K j where D B K j = g 2 m + q + d j is the batch authentication key for D j .
Step 3: Moreover, the controlling device of D j computes the G j = H ( e j | | F j ) to preserve the integrity of the confidential information. Then, the quadruple is calculated as ( F j ,   G j ,   e j ,   D T K j ) , where D T K j = g 2 m q is the drone tracking key, and it is sent to the E U i .
Step 4: To validate the number of individual messages sent by each D j , the E U i first checks the integrity of each message by calculating the hash value of F j and e j .
Step 5: If the integrity is verified, then the E U i gathers F 1 , F 2 , F 3 F j as F = i = 1 j F j . Similarly, e 1 , e 2 , e 3 e j are accumulated as e = i = 1 j e j .
Step 6: Finally, E U i checks F e = ( U B K j ) j . If this condition is satisfied, then the messages send by j number of drones are batch authenticated.
Proof of correctness
F = i = 1 j F j = i = 1 j E j . D B K j = E 1 . D B K 1 . E 2 . D B K 2 E j . D B K j = g 2 c 1 d 1 . g 2 m + q + d 1 . g 2 c 2 d 2 . g 2 m + q + d 2 g 2 c j d j . g 2 m + q + d j = g 2 c 1 + m + q g 2 c 2 + m + q g 2 c j + m + q = g 2 c 1 + m + q + c 2 + m + q . c j + m + q e = i = 1 j e j = i = 1 j g 2 c j = g 2 c 1 . g 2 c 2 g 2 c j = g 2 c 1 + c 2 + . c j F e = g 2 c 1 + m + q + c 2 + m + q . c j + m + q g 2 c 1 + c 2 + . c j = g 2 c 1 + m + q + c 2 + m + q . c j + m + q ( c 1 + c 2 + . c j ) = g 2 ( j * m + J * q ) = g 2 j ( m + q ) = ( U B K j ) j

4.7. Location Privacy

In case of any energy loss or fault in the current active D j , it should be replaced by the E U i . However, the real location of the is anonymous. Therefore, in order to retrieve the actual real location, the T S sends the real location of the D j to the authenticated E U i anonymously. To perform the location privacy, the three coordinates of the D j location are to be known. The three coordinates are generally represented as latitude, longitude, and altitude. Since the D j is placed at a certain distance from the ground surface, the altitude is to be incorporated as the third coordinate. Figure 2 shows the schematic location of drone in the three-coordinate system.
For instance, let us consider the D j geographic location as (15.92,80.18,400). Here, x , y , and z represent latitude ( φ ), longitude ( λ ), and altitude ( h ), respectively. The T S executes the following steps as follows, T S calculates
  • i = f i
  • i i 1   m o d   i
  • i = i i
  • μ = i
  • = μ × ω , here ω = E r ( φ | λ | h ) .
Finally, the value of is provided to the E U i . The value of secret key f is provided to the E U i by T S during initial offline registration. The E U i calculates ω as   m o d   i . By decrypting ω with the public key of the T S , the three required coordinates can be retrieved by the E U i . This protocol is mainly based on Chinese remainder theorem (CRT) [37].

5. Security Analysis

Analysis of some conceivable security attacks is described in this section.

5.1. Impersonation Attack

When an adversary efficaciously imitates a legitimate E U i or D j in the FANET, it is called an impersonation attack. In our suggested scheme, security parameters such as private key ( α e u ) , fake identity ( F I D e u ) , end-user batch key ( U B K j ) , and the secret key for finding the exact location ( f ) are provided by the T S during offline registration. To regenerate the exact replica of the keys, an adversary should have knowledge regarding the master key and private key of T S . However, the confidentiality of these keys is high, and it is hard for an attacker to compute these keys. Moreover, to compute the value of the public key α e u = g 2 1 m + q + u j , the value of the private key of the E U i ( u j ) should be known. However, it is a randomly chosen number, and the computation involves a discrete logarithm problem (DLP) [38].

5.2. Bogus Message Attack

The adversary should be capable of sending a bogus message in place of the real message to the E U i . To perform this task, the adversary should compromise the controlling device of the D j . However, this is practically not possible since the drone is registered with T S and any misbehavior of the D j leads to its revocation from the network by T S . Thus, our suggested work shows resistance against fake message attack.

5.3. Message Modification Attack

The collected confidential information/data from the D j to E U i are3 transferred in a secured way. Here, short time session keys are generated for transferring the information to the E U i . It is very difficult for an adversary to generate the equivalent short life session key and to perform the message modification attack. Moreover, the integrity of the session key is also ensured in our suggested work. As a result, our scheme is resistant to message alteration attack.

5.4. Reply Attack

When an adversary is capable of capturing the transferred information, modifying it and sending to the E U i in the same stipulated time, it is called a reply attack. However, in this proposed work, timestamps are attached during the session key exchange. During initial session key generation request, E U i sends ( s 0 , s 2 , x , T ) to the D j ; here, D j checks the validity of the current timestamp ( T ) . If the minimum delay is not satisfied, then the request is discarded. Moreover, after the session key generation, D j sends ( s k ,   T 1 ) to E U i . Here also, the validity of ( T 1 ) is checked to ensure the legitimacy of the session key. Since the information is transferred with the assistance of the session key, without capturing the session key, it is hard for an adversary to perform a reply attack. Thus, our scheme is resistant to reply attack.

5.5. Privacy Preservation

Anonymous dummy identities are used to hide the real identities of the D j and the E U i in this proposed scheme. Mutual authentication uses only the dummy E U i identity and dummy D j identity. Therefore, even if the adversary discovers the dummy identity of the E U i / D j , it is difficult for the adversary to determine the original identity of the E U i / D j . In addition, the fake identity of E U i and D j are calculated as F I D e u = g 1 1 ( m + q ) u j and F I D D j = ( m + q ) 2 d j , which involves the master key, the private key of T S , and the private key of E U i and D j . Tracing of the private keys of E U i / D j is hard due to DLP. As a result, privacy is preserved in this suggested work.

5.6. Repudiation Attack

In this suggested framework, repudiation of the E U i is not possible. Here, the E U i is registered with the T S offline. Only after the successful authentication, the security parameters are transferred to E U i and the authenticated E U i becomes the part of the network. As a result, only the authenticated E U i can request information/data from the authenticated drone. Therefore, on receiving the confidential data from the controlling device of D j , the E U i cannot repudiate.

5.7. Unlinkability

Confidential information is transferred using the short life session key. These session keys have a limited life span. As a result, once the information is transferred with this short life session key, the validity of this session key expires. During the next/successive information transfer, a new session key is to be generated for efficient transfer of information. Thus, there exists an unlinkability between the two successive messages. Therefore, it is hard for an adversary to link the two messages from the same user.

5.8. Man in Middle Attack

If an adversary is capable of deceiving both the D j and the E U i , a man in the middle attack is possible. In our suggested work, even if an adversary captures ( γ ,   α D j ,   F I D D j ) from D j , it is difficult for an adversary to alter the parameters in the list. Even if the adversary modifies the credentials, E U i checks the condition e ( γ .   α c a ,   α D j ) = Z . If the condition is not gratified, then the current authentication request is aborted. Thus, our work is resistant to man in the middle attack.

5.9. Privileged Insider Attack

The required credentials for the D j and E U i are provided by T S during the initial offline registration in a secure way. Therefore, it is impossible for an inside attacker to generate fake credentials for D j / E U i . Moreover, T S is a completely trusted authority and it is difficult for an inside attacker to compromise it. The validity of the session key generated is only for a limited period and it is hard for an inside attacker to crack it. Thus, our proposed work is resistant to insider attack.

6. Performance Analysis

The performance investigation of the suggested scheme is described in terms of computational cost, communication cost, storage cost, and drone’s service providing capability. The following subsections briefly explain the aforementioned analysis.

6.1. Computational Cost

In the analysis of the computational cost, the cost involved in the generation of public key, fake identity generation, and key exchange protocol is examined. The cryptographic operations involved in the analysis of computational cost are hashing operation, exponential operation, multiplication operation, one-point addition operation, pairing operation, and reverse fuzzy extraction operation. The execution time representations of the above-mentioned operations are E x h , E x e ,   E x m ,   E x a , E x p , and E x f e , respectively. To accomplish these operations, the cryptographic library based on pairing is utilized with Type-A curve. Moreover, Cygwin version 1.7.35 [39] is used with the system requirements of Core i7, 3.4GHz processor, 8GB memory, and gcc version 4.9.2. The implementation time for performing E x h , E x m ,   E x e ,   E x a ,   E x p , and E x f e are calculated as 2.6 m s , 1.2   m s , 0.6   m s , 2.6   m s , 1.72   m s , and 2.13   m s , respectively, where m s represents the execution time in milliseconds. Table 3 clearly shows the comparison of the computational cost for various schemes in terms of the execution time for different cryptographic functions. A total of ( 3 E x e + 2 E x p + E x h = 7.84   m s ) is required as the computational time at the D j side. The suggested work is compared with the related existing schemes such as Singh et al. [30], Tian et al. [31], Wazid et al. [21], Gope et al. [32], Zhang et al. [33], Ever et al. [34], and Hussain et al. [35] schemes, respectively. The computational cost for the schemes [21,30,31,32,33,34,35] are 9.6   m s , 9   m s , 18.2   m s , 19.04   m s , 18.2 m s , 31.64 m s , and 18.2 m s which are high when compared to the suggested work. Similarly, a total of ( 4 E x e + E x p + E x h = 6.72   m s ) is required as the computational cost at the E U i side, whereas the prevailing schemes such as [21,30,31,32,33,34,35] require 7.2   m s , 7   m s , 43.73   m s , 18.2   m s , 26   m s , 16.44   m s , and 41.13   m s , respectively. Figure 3 and Figure 4 show the graphical representation of computational cost both at D j side and E U i side for different schemes. From the figures, it is clear that the suggested work has less computational cost both at the drone and user side. Table 4 shows the computational cost analysis for the batch authentication process. The investigation is performed for 100 simulations and performance is evaluated. Figure 5 shows the pictorial representation of batch authentication for the large number of drones. The graph portrays that the suggested work outperforms the prevailing works.

6.2. Communication Cost

Once the mutual authentication is accomplished between the E U i and D j , exchange of session key takes place. During session key exchange protocol, the E U i sends ( s 0 , s 2 , x , T ) to D j . Here, ( s 0 , s 2 , x , T ) are the elements of Z a * . Moreover, the returns the value of ( s k ,   T 1 ) to the E U i after successful validation. The communication cost for the key exchange protocol is calculated as ( 5 * 32 + 1024 = 1184   b i t s ) . Table 5 portrays the assessment of communication cost for various schemes. From the table, it is clear that the suggested scheme consumes minimum cost when compared to the prevailing schemes. Figure 6 clearly displays the graphical representation of communication cost for various prevailing schemes with our proposed work.

6.3. Storage Cost

The capacity of the D j to store the keys in its controlling device is termed as the storage cost. Since the memory capacity is related to the resource constraint of D j ’s design. The keys generated should be small enough to be accompanied in the design. In this suggested framework, the D j is equipped to store the value of session key and timestamp values for a period. The memory storage for the proposed protocol is calculated as 1046 bits. Table 6 shows the comparison of the storage cost of the proposed work with the existing schemes. The suggested work is compared with prevailing works such as Singh et al. [22], Tian et al. [23], and Zhang et al. [25] and found to have lower storage cost. Figure 7 depicts the graphical illustration of the storage cost of different prevailing works with the suggested work.

6.4. Drone’s Serving Capability

The number of drones efficiently providing service to the end-user determines the drone’s serving capability. Let Ρ be the probability of number of drones that provide service to the E U i . The total computational time incurred in this suggested work is calculated as Λ = 7 E x e + 2 E x p + 2 E x h . Thus, the service providing competency of the D j is calculated as ϖ = Ρ . Λ * . Figure 8 shows the serving capability of D j . From the figure, it clearly indicates that the service-providing competency decreases with the increase in the number of drones. Moreover, the figure s if the computational time is low, the serving capability is high.

7. Conclusions

A competent mutual and batch anonymous authentication scheme with location privacy is suggested in this article. This work suggests an effective secure communication in the IoD environment. In case of critical situations, the location privacy of D j is preserved in this suggested work. The security investigation section ensures the resistance of the proposed work against various well-known attacks. Finally, D j ’s serving capability to the E U i is also deliberated. The main contribution of privacy preservation between the end users is achieved. Moreover, for authenticating groups of drones, batch authentication with reduced computational overhead is implemented. In addition, integrity preservation of the confidential information from the drone and location privacy of the drone is preserved.
The suggested work uses only a simple cryptographic pairing and hashing operations for both privacy preservation during mutual and batch authentication which reduces the computational cost, communication cost, and storage cost significantly when compared to prevailing existing schemes. Session keys are generated the preserve the integrity and privacy of the confidential information. Moreover, a simple EXOR operation is utilized during the session key generation request, session key integrity preservation, and key exchange. Finally, location privacy can be achieved by efficiently by utilizing the CRT algorithm. The future scope of this work can be extended to the incorporation of artificial intelligence (AI) and blockchain technology into the authentication protocol.

Author Contributions

A.S.R.: proposed work, security analysis, paper writing. A.M.: experimental work, literature survey, paper writing. F.A.-T.: performance analysis, system model. C.A.: literature survey, computational cost, paper writing. L.M.: proposed work, system model. All authors have read and agreed to the published version of the manuscript.

Funding

The authors declare no funding received for this research.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors appreciate the support from Artificial Intelligence Engineering Dept., Research Center for AI and IoT, Near East University, Mersin 10, Turkey, University of Waterloo, Waterloo, Ontario, Canada, and Computer Science Division, Camerino University, Italy. The authors thank GMR Institute of Technology, Rajam, Andhra Pradesh for the technical assistance to complete this experimental work.

Conflicts of Interest

The authors declare that they have no conflict of interest regarding the publication of this paper.

References

  1. Gupta, L.; Jain, R.; Vaszkun, G. Survey of important issues in UAV communication networks. IEEE Commun. Surv. Tutor. 2016, 18, 1123–1152. [Google Scholar] [CrossRef] [Green Version]
  2. Labib, N.S.; Brust, M.R.; Danoy, G.; Bouvry, P. The Rise of Drones in Internet of Things: A Survey on the Evolution, Prospects and Challenges of Unmanned Aerial Vehicles. IEEE Access 2021, 9, 115466–115487. [Google Scholar] [CrossRef]
  3. Filkin, T.; Sliusar, N.; Ritzkowski, M.; Huber-Humer, M. Unmanned Aerial Vehicles for Operational Monitoring of Landfills. Drones 2021, 5, 125. [Google Scholar] [CrossRef]
  4. Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun. Mag. 2018, 56, 64–69. [Google Scholar] [CrossRef]
  5. Wu, Q.; Xu, J.; Zeng, Y.; Ng, D.W.K.; Al-Dhahir, N.; Schober, R.; Swindlehurst, A.L. A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From Communications to Sensing and Intelligence. IEEE J. Sel. Areas Commun. 2021, 39, 2912–2945. [Google Scholar] [CrossRef]
  6. Nait-Abdesselam, F.; Alsharoa, A.; Selim, M.Y.; Qiao, D.; Kamal, A.E. Towards enabling unmanned aerial vehicles as a service for heterogeneous applications. J. Commun. Netw. 2021, 23, 212–221. [Google Scholar] [CrossRef]
  7. Iqbal, A.; Rajasekaran, A.S.; Nikhil, G.S.; Azees, M. A Secure and Decentralized Blockchain Based EV Energy Trading Model Using Smart Contract in V2G Network. IEEE Access 2021, 9, 75761–75777. [Google Scholar] [CrossRef]
  8. Raja, G.; Anbalagan, S.; Subramaniyan, A.G.; Selvakumar, M.S.; Bashir, A.K.; Mumtaz, S. Efficient and Secured Swarm Pattern Multi-UAV Communication. IEEE Trans. Veh. Technol. 2021, 70, 7050–7058. [Google Scholar] [CrossRef]
  9. Arasan, A.; Sadaiyandi, R.; Al-Turjman, F.; Rajasekaran, A.S.; Karuppuswamy, K.S. Computationally efficient and secure anonymous authentication scheme for cloud users. Pers. Ubiquitous Comput. 2021, 566, 1–11. [Google Scholar] [CrossRef]
  10. Shafique, A.; Mehmood, A.; Elhadef, M. Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles. IEEE Access 2021, 9, 46927–46948. [Google Scholar] [CrossRef]
  11. Azees, M.; Vijayakumar, P.; Deboarh, L.J. EAAP: Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2467–2476. [Google Scholar] [CrossRef]
  12. Subramani, J.; Azees, M.; Sekar, A.; Al-Turjman, F. Lightweight Privacy and Confidentiality Preserving Anonymous Authentication Scheme for WBANs. IEEE Trans. Ind. Informatics. 2021, 9, 7759. [Google Scholar] [CrossRef]
  13. Sanjab, A.; Saad, W.; Basar, T. A Game of Drones: Cyber-Physical Security of Time-Critical UAV Applications with Cumulative Prospect Theory Perceptions and Valuations. IEEE Trans. Commun. 2020, 68, 6990–7006. [Google Scholar] [CrossRef]
  14. Subramani, J.; Maria, A.; Neelakandan, R.B.; Rajasekaran, A.S. Efficient anonymous authentication scheme for automatic dependent surveillance-broadcast system with batch verification. IET Commun. 2021, 15, 1187–1197. [Google Scholar] [CrossRef]
  15. Wu, T.; Guo, X.; Chen, Y.; Kumari, S.; Chen, C. Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks. Drones 2022, 6, 10. [Google Scholar] [CrossRef]
  16. Turkanović, M.; Brumen, B.; Hölbl, M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Network 2014, 20, 96–112. [Google Scholar] [CrossRef]
  17. Amin, R.; Islam, S.H.; Biswas, G.; Khan, M.K.; Leng, L.; Kumar, N. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 2016, 101, 42–62. [Google Scholar] [CrossRef]
  18. Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Reddy, A.G.; Yoon, E.-J.; Yoo, K.-Y. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 2017, 5, 3028–3043. [Google Scholar] [CrossRef]
  19. Won, J.; Seo, S.-H.; Bertino, E. Bertino, Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 2017, 5, 3721–3749. [Google Scholar] [CrossRef]
  20. Tai, W.-L.; Chang, Y.-F.; Li, W.-H. An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. J. Inf. Secur. Appl. 2017, 34, 133–141. [Google Scholar] [CrossRef]
  21. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Conti, M.; Jo, M. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet Things J. 2018, 5, 269–282. [Google Scholar] [CrossRef]
  22. Yue, X.; Liu, Y.; Wang, J.; Song, H.; Cao, H. Software defined radio and wireless acoustic networking for amateur drone surveillance. IEEE Commun. Mag. 2018, 56, 90–97. [Google Scholar] [CrossRef]
  23. Bouman, P.; Agatz, N.; Schmidt, M. Dynamic programming approaches for the traveling salesman problem with drone. Networks 2018, 72, 528–542. [Google Scholar] [CrossRef] [Green Version]
  24. Hong, I.; Kuby, M.; Murray, A.T. A range-restricted recharging station coverage model for drone delivery service planning. Transp. Res. Part C: Emerg. Technol. 2018, 90, 198–212. [Google Scholar] [CrossRef]
  25. Shavarani, S.M.; Mosallaeipour, S.; Golabi, M.; İzbirak, G. A congested capacitated multi-level fuzzy facility location problem: An efficient drone delivery system. Comput. Oper. Res. 2019, 108, 57–68. [Google Scholar] [CrossRef]
  26. Aggarwal, S.; Shojafar, M.; Kumar, N.; Conti, M. A new secure data dissemination model in Internet of drones. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  27. Huang, H.; Savkin, A.V. A method of optimized deployment of charging stations for drone delivery. IEEE Trans. Transp. Electrif. 2020, 6, 510–518. [Google Scholar] [CrossRef]
  28. Shavarani, S.M.; Golabi, M.; Izbirak, G. A capacitated biobjective location problem with uniformly distributed demands in the UAV-supported delivery operation. Int. Trans. Oper. Res. 2021, 28, 3220–3243. [Google Scholar] [CrossRef]
  29. Cokyasar, T. Optimization of battery swapping infrastructure for e-commerce drone delivery. Comput. Commun. 2021, 168, 146–154. [Google Scholar] [CrossRef]
  30. Singh, J.; Gimekar, A.; Venkatesan, S. An efficient lightweight authentication scheme for human-centered industrial Internet of Things. Int. J. Commun. Syst. 2019, 2, e4189. [Google Scholar] [CrossRef]
  31. Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 2019, 48, 102354. [Google Scholar] [CrossRef]
  32. Gope, P.; Sikdar, B. An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones. IEEE Trans. Veh. Technol. 2020, 69, 13621–13630. [Google Scholar] [CrossRef]
  33. Zhang, Y.; He, D.; Li, L.; Chen, B. A lightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 2020, 154, 455–464. [Google Scholar] [CrossRef]
  34. Ever, Y.K. A secure authentication scheme framework for mobile-sinks used in the internet of drones applications. Comput. Commun. 2020, 155, 143–149. [Google Scholar] [CrossRef]
  35. Hussain, S.; Mahmood, K.; Khan, M.K.; Chen, C.M.; Alzahrani, B.A.; Chaudhry, S.A. Designing secure and lightweight user access to drone for smart city surveillance. Comput. Stand. Interfaces 2021, 80, 103566. [Google Scholar] [CrossRef]
  36. Bigazzi, L.; Basso, M.; Boni, E.; Innocenti, G.; Pieraccini, M. A Multilevel Architecture for Autonomous UAVs. Drones 2021, 5, 55. [Google Scholar] [CrossRef]
  37. Zhou, J.; Ou, Y.-H. Key tree and chinese remainder theorem based group key distribution scheme. J. Chin. Inst. Eng. 2009, 32, 967–974. [Google Scholar] [CrossRef]
  38. Blake, I.; Seroussi, G.; Smart, N. The Elliptic Curve Discrete Logarithm Problem. In Selected Areas in Cryptography; Springer: Berlin/Heidelberg, Germany, 1999; pp. 79–100. [Google Scholar] [CrossRef]
  39. Cygwin: Linux Environment Emulator for Windows. Available online: http://www.cygwin.com/ (accessed on 10 December 2021).
Figure 1. System model of proposed work.
Figure 1. System model of proposed work.
Drones 06 00014 g001
Figure 2. Three coordinate system representation.
Figure 2. Three coordinate system representation.
Drones 06 00014 g002
Figure 3. Computational cost at drone side for different schemes.
Figure 3. Computational cost at drone side for different schemes.
Drones 06 00014 g003
Figure 4. Computational cost at end user side for different schemes.
Figure 4. Computational cost at end user side for different schemes.
Drones 06 00014 g004
Figure 5. Graphical representation of batch authentication for large number of drones.
Figure 5. Graphical representation of batch authentication for large number of drones.
Drones 06 00014 g005
Figure 6. Communication cost for various schemes.
Figure 6. Communication cost for various schemes.
Drones 06 00014 g006
Figure 7. Graphical illustration of the storage cost for different schemes.
Figure 7. Graphical illustration of the storage cost for different schemes.
Drones 06 00014 g007
Figure 8. Graphical illustration of the drone’s serving capability.
Figure 8. Graphical illustration of the drone’s serving capability.
Drones 06 00014 g008
Table 1. Summary of different existing approaches.
Table 1. Summary of different existing approaches.
Existing WorksPublication YearTechniquesDrawbacks
Turkanovic et al. [16]2014One way hash fuction is utilized.User anonymity is not preserved.
Impersonation attack on sensor node is possible.
Amin et al. [17]2016Secured authentication protocol for smart card.Suffers from password guessing attack.
Challa et al. [18]2017Signature-based authentication scheme using ECC.High computational and storage costs.
Won et al. [19]2017Secured certificateless scheme.
Conditional tracking mechanism.
Lacks location privacy.
High communication cost.
Tai et al. [20]2017Two-factor authentication schemeCannot withstand replay attack and privileged-insider attack.
Wazid et al. [21]2018Three-factor authentication.
One way hash fuction is utilized.
No mutual authentication.
Privileged insider attack and impersonation attack.
Yue et al. [22]2018Secured AI-based technique.Not focussed on security issues.
Latency problem.
Bouman et al. [23]2018Dynamic programming approach.Computational cost is high.
Hong et al. [24]2018A heuristic algorithm approach.Lacks security analysis and privacy.
Shavarani et al. [25]2019Biobjective mathematical model.Non deterministic polynomial time-hard problem.
Aggarwal et al. [26]2019Authentication scheme based on blockchain topology.High computational complexity.
Huang et al. [27]2020Triangular-based approach.High communication and storage cost.
Shavarani et al. [28]2021Fuzzy logic-based approach.Lacks security and privacy concerns.
Cokyasar et al. [29]2021Automated swapping approach.Prone to security attacks.
Singh et al. [30]2019Secure authentication framework based on IIoT.High computational cost, and there is no location privacy.
Tian et al. [31]2019Secured authentication protocol.High computational and storage costs.
Gope et al. [32]2020Physically unclonable function and one way hash operation is utilized.Lacks location privacy.
Zhang et al. [33]2020Two factor authentication.
One-way hash fuction is utilized.
It does not offer untraceability.
Ever et al. [34]2020Secure authentication framework with ECC.High communication cost.
Lacks location privacy.
Hussain et al. [35]2022 Three-factor authentication.High communication cost.
Table 2. List of notations and abbreviations.
Table 2. List of notations and abbreviations.
NotationsExplanation
T S trusted server
E U i end user
D j drone
G 1 ,   G 2 cyclic multiplicative group
g 1 , g 2 generator   of   groups   G 1   and   G 2
Z a * non-zero elements of a finite field Z a ,   where   Z a * = [1,2,…,a−1]
a prime order
e asymmetric bilinear map
m master key for the trusted server
q private key for the trusted server
  α t s public key for the trusted server
H : { 0 , 1 } secure hash function
u j private key for the end user
α e u public key for the end user
F I D e u fake identity for the end user
U B K j batch authentication key for the end user
f secret key to trace exact location
d j private key for the drone
α D j public key for the drone
F I D D j fake identity for the drone
D B K j drone batch key
D T K j drone tracking key
T ,   T 1 timestamps
EXOR operation
s k session key for the end user
c j short life private key for drone
e j short life public key for drone
φ x axis (latitude)
λ y axis (longitude)
h z axis (altitude)
Table 3. Computational cost at drone and end user side for different schemes.
Table 3. Computational cost at drone and end user side for different schemes.
Schemes Drone   ( D i ) End   User   ( E U i ) Total Cost
Singh et al. [30] 2 E x e + 7 E x m 2 E x e + 5 E x m 4 E x e + 12 E x m
Tian et al. [31] E x m + E x a + 2 E x h E x e + E x m + 2 E x h E x m + E x a + E x e + 4 E x h
Gope et al. [32] 2 E x p + 6 E x h 7 E x h 2 E x p + 13 E x h
Zhang et al. [33] 7 E x h 10 E x h 17 E x h
Ever et al. [34] 2 E x p + 9 E x h + 4 E x m 2 E x p + 5 E x h 4 E x p + 14 E x h + 4 E x m
Hussain et al. [35] 7 E x h 15 E x h + 1 E x f e 22 E x h + E x f e
Wazid et al. [21] 7 E x h 16 E x h + 1 E x f e 23 E x h + E x f e
Proposed
Scheme
3 E x e + 2 E x p + E x h 4 E x e + E x p + E x h 7 E x e + 2 E x p + 2 E x h
Table 4. Computational cost analysis for the batch authentication process.
Table 4. Computational cost analysis for the batch authentication process.
Schemes Batch   Authentication   at   the   D i   Side
Singh et al. [30] ( n + 1 ) E x e + 5 E x m
Tian et al. [31] n E x m + n E x a + ( n + 1 ) E x h
Gope et al. [32] ( n + 1 ) E x p + 6 n E x h
Zhang et al. [33] 7 n E x h
Ever et al. [34] ( n + 1 ) E x p + ( 4 n + 5 ) E x h + ( n + 3 ) E x m
Hussain et al. [35] 7 n E x h
Wazid et al. [21] ( 4 n + 3 ) E x h
Proposed Scheme ( n + 2 ) E x e + ( n + 1 ) E x p + n E x h
Table 5. Assessment of communication cost for various schemes.
Table 5. Assessment of communication cost for various schemes.
Various SchemesCommunication Cost for Single Authentication Communication   Cost   for   n   Authentication
Singh et al. [30] 4256 4256 n
Tian et al. [31] 7328 7328 n
Gope et al. [32] 1792 1792 n
Zhang et al. [33] 1472 1472 n
Ever et al. [34] 1920 1920 n
Hussain et al. [35] 2061 2061 n
Wazid et al. [21] 1696 1696 n
Singh et al. [30] 1184 1184 n
Table 6. Assessment of storage cost for different schemes.
Table 6. Assessment of storage cost for different schemes.
Different SchemesTotal Storage Cost (bits)
Singh et al. [30] 1152
Tian et al. [31] 2368
Zhang et al. [33] 2752
Proposed Scheme 1046
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rajasekaran, A.S.; Maria, A.; Al-Turjman, F.; Altrjman, C.; Mostarda, L. Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET. Drones 2022, 6, 14. https://doi.org/10.3390/drones6010014

AMA Style

Rajasekaran AS, Maria A, Al-Turjman F, Altrjman C, Mostarda L. Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET. Drones. 2022; 6(1):14. https://doi.org/10.3390/drones6010014

Chicago/Turabian Style

Rajasekaran, Arun Sekar, Azees Maria, Fadi Al-Turjman, Chadi Altrjman, and Leonardo Mostarda. 2022. "Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET" Drones 6, no. 1: 14. https://doi.org/10.3390/drones6010014

APA Style

Rajasekaran, A. S., Maria, A., Al-Turjman, F., Altrjman, C., & Mostarda, L. (2022). Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET. Drones, 6(1), 14. https://doi.org/10.3390/drones6010014

Article Metrics

Back to TopTop