0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
نویسندگان :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
کلمات کلیدی :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
چکیده :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
لیست مقالات
لیست مقالات بایگانی شده
Optimal control of robotic hand for rehabilitation using fractional order systems and EEG signal processing
Mehran Safari Dehnavi - Vahid Safari Dehnavi - Masoud Shafiee
Analysing effect of news polarity on stock market prediction: a machine learning approach
Golshid Ranjbaran - Dr Mohammad-Shahram Moin - Dr Sasan H Alizadeh - Dr Abbas Koochari
Securing the Internet of Things via Blockchain-Aided Smart Contracts
S. Mohammadali Zanjani - Hossein Shahinzadeh - Jalal Moradi - Zohreh Rezaei - Bahareh Kaviani-Baghbaderani - Sudeep Tanwar
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
Maryam Eslami - Dr Mehdi Sakhaei-nia
Sentiment Analysis of the Amazon Customers Using the BiGRU Neural Network Enhanced by Attention Mechanism
Sara Sinan Salman al-Abedi - Keyvan Mohebbi
بررسی روشها، مجموعههای داده و معیارهای ارزیابی در حوزهی پرسش از متون درون تصویر
کبری فرشیدی - حسن ختنلو - محرم منصوری زاده - الهام علی قارداش
Advanced SMS Spam Detection using Deep Complex Models and Sine-Cosine Algorithm
Sepehr Rezaei - Mohammadreza Shams - Mohsen Alambardar Meybodi
Aligning the Brick and Mortar cosmetic with digital transformation as the right way to overhaul the In-store Experience
Mehrgan Malekpour - Dr Federica Caboni
تشخیص ارتباط معنایی در استکاورفلو با رمزگذار جمله جهانی
مجید دلیری - جعفر حبیبی - عیسی انامرادنژاد
A Multi Objective & Trust-Based Workflow Scheduling Method In Cloud Computing Based On The MVO Algorithm
Fatemeh Ebadifard
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.2.4