0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
نویسندگان :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
کلمات کلیدی :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
چکیده :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
لیست مقالات
لیست مقالات بایگانی شده
SBST challenges from the perspective of the test techniques
Sepideh Kashefi Gargari - Dr Mohammad Reza Keyvanpour
CRYPTOCURRENCY PRICE PREDICTION USING A HYBRID DEEP MODEL AND TECHNICAL AND PSYCHOLOGICAL INDICATORS
Mohammadreza Borjian - Mohammad Mehdi Homayounpour
Binary water stream algorithm: a new meta-heuristic optimization technique
Faezeh Rahimi Sebdani - Mehdi Nasri
Enhancing Persian Speech Emotion Recognition with Contrastive Learning and Multimodal Fusion
Mobina Esmaeili - Vajiheh Sabeti
پیدا کردن خبره در انجمنهای پرسش و پاسخ با استفاده از الگوریتم طبقهبندی ترکیبی
مهراد قاضی پور - علیرضا رضوانیان
پیشنهادات کالیبره شده براساس احساسات استخراج شده از متون مرتبط با آیتم ها
شیوا پارساراد - دکتر سامان هراتی زاده شیوا پارساراد - سامان هراتی زاده -
Context Awareness Gate for Retrieval Augmented Generation
Mohammad Hassan Heydari - Arshia Hemmat - Erfan Naman - Afsaneh Fatemi
AN EFFICIENT TASK SCHEDULING IN CLOUD COMPUTING BASED ON ACO ALGORITHM
Zahra Shafahi - Dr Alireza Yari
یک رویکرد سریع تحلیل و شناسایی آسیب پذیری Next-Intent در برنامه های کاربردی اندروید
زهرا کلوندی - دکتر مهدی سخائی نیا زهرا کلوندی - مهدی سخائی نیا -
A Framework for Systematic Stability Assessment of Post-hoc Explanations in Text Classification
Parman Mohammadalizadeh - Parham Mohammadalizadeh - Ayda Mahmoudian
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2