0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Authors :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
Keywords :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
Abstract :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
Papers List
List of archived papers
A clonal selection mechanism for load balancing in the cloud computing system
Melika Mosayyebi - Reza Azmi
Impact of ICT and Digital Evolution on Capital Structure in Companies
Ali Noori
A Blockchain Architecture for Secure, High-Speed P2P Energy Trades with Game-Theoretic Coalition Formation
Amin Aboutalebi Najafabadi - Seyed Hossein Hosseinian
SPA Bot: Smart Price-Action Trading Bot for Cryptocurency Market
Dr Hamid Jazayeriy - Mohammad Daryani
رویکرد تطبیقی-ترکیبی در پیادهسازی مشارکت الکترونیکی پایدار: درسآموختههای بینالمللی و مدل پیشنهادی ایران
عاطفه فرازمند - فاطمه پاک مهر
DRL-Based Phase Optimization for O-RIS in Dual-Hop Hard Switching FSO/RIS-aided RF and UWOC Systems
Aboozar Heydaribeni - Hamzeh Beyranvand - Sahar Eslami
Enhancing QSAR Modeling: A Fusion of Sequential Feature Selection and Support Vector Machine
Farzaneh Khajehgili-Mirabadi - Mohammad Reza Keyvanpour
Dealing with Black-hole Attacks in Inter-vehicle Networks Using the Packet Delivery Rate Algorithm
Marzieh Sedighi - Mehdi Hamidkhani - Mostafa Sadeghi
A qualitative spoofing detection system based on LSTMs for IoMT
Iman Jafarian - Amirmasoud Sepehrian - Siavash Khorsandi
یادگیری فناورانه و بینالمللیسازی سکوهای پیامرسان: چارچوبی برای بازیگران متأخر
علیرضا کبیری فرد - علی ولی زاده - مهدی مجیدپور
more
Samin Hamayesh - Version 42.5.2