0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Authors :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
Keywords :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
Abstract :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
Papers List
List of archived papers
Human Resource Allocation to the Credit Requirement Process, A Process Mining Approach
Omid Mahdi Ebadati - Mohammad Mehrabioun - Shokoofeh Sadat Hosseini
Enhancing QSAR Modeling: A Fusion of Sequential Feature Selection and Support Vector Machine
Farzaneh Khajehgili-Mirabadi - Mohammad Reza Keyvanpour
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
Maryam Eslami - Dr Mehdi Sakhaei-nia
Improved Weighting in the Automated Texts Classification using Fuzzy Method
Hamidreza Sadrarhami - S. Mohammadali Zanjani - Ghazanfar Shahgholian
سیستم تشخیص نفوذ مبتنی برشبکه عصبی کانولوشن برای تشخیص حمله انکارسرویس در اینترنت وسایل نقلیه
زهرا جانفدا - سید امین حسینی سنو
An Eco-Friendly Cosmopolitan (EFC) by Recycling Scientific/Industrial Towns (RSITs)
Engineer Reza Khalilian - Dr. Abdalhossein Rezai - Dr. Mohammadreza Talakesh
A Graph Attention-Based Autoencoder for Critical Path Anomaly Detection in Microservices
Mahdi Naderi - Hossein Momeni - Shayan Shahini
Non-Linear Control of Cancer Model, Considering the Drug Resistance Using Feedback Based Chemotherapy Approach
Danial Kiaei - Hami Tourajizadeh
Effective Design of Reversible 2×2 Vedic Multiplier With Low Cost
Mojtaba Noorallahzadeh - Mohammad Mosleh - Ali Shahidikia
A Deep Neural Network-based Method for MmWave Time-varying Channel Estimation
Amirhossein Molazadeh - Zahra Maroufi - Mehrdad Ardebilipour
more
Samin Hamayesh - Version 42.3.1