0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Authors :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
Keywords :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
Abstract :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
Papers List
List of archived papers
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
ElectroCNN: Regressive CNN-based Energy Consumption Forecasting Leveraging Weather Data
Dharmi Patel - Mann Patel - Krisha Darji - Rajesh Gupta - Sudeep Tanwar - Jitendra Bhatia - Hossein Shahinzadeh
A Novel Approach to Data mining algorithms and IoT based data mining machine learning
Danial Ramezani - Seyed Hossein Siadat
تشخیص مراحل خواب با کمک جنگل تصادفی و ویژگی های فرکانسی استخراج شده از سیگنال های EEG و EOG
سیدعلی حسینی
کنترل کیفیت غیرمتمرکز مبتنی بر هوش ترکیبی در سیستمهای مشارکتی برخط
مهدیه طالب زاده - هاله امین طوسی - محمد اله بخش
User Preferences Elicitation in Bilateral Automated Negotiation Using Recursive Least Square Estimation
Farnaz Salmanian - Dr Hamid Jazayeri - Dr Javad Kazemitabar
Predicting Concentration of Particulate Matter (PM2.5) in Hamedan using Machine Learning Algorithms
Anita Karim Ghassabpour - Hatam Abdoli - Muharram Mansoorizadeh - Saeid Seyedi
ML-based Optical Fibre Fault Detection in Smart Surveillance and Traffic Systems
Rushil Patel - Sana Narmawala - Nikunjkumar Mahida - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
ارائه یک الگوریتم سلسله مراتبی جهت تشخیص نفوذ در شبکه های کامپیوتری
دکتر باقر رحیم پور کامی - سیدمحمد سیدی برشی باقر رحیم پور کامی - سیدمحمد سیدی برشی -
مکانیابی بهینه آلودگی در شبکههای توزیع آب با استفاده از تکنولوژی اینترنت اشیاء بر مبنای پیشبینی سری زمانی چند متغیره
زینب محزون - امید بوشهریان
more
Samin Hamayesh - Version 42.5.2