0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
نویسندگان :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
کلمات کلیدی :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
چکیده :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
لیست مقالات
لیست مقالات بایگانی شده
انتخاب ویژگی با استفاده از الگوریتم بهینه سازی ذرات مبتنی بر استراتژی خود تطبیقی دودویی جهت تشخیص بیماری
الهام صالحی - دکتر محمدرضا کرمی ملایی - دکتر حسام عمرانپور الهام صالحی - محمدرضا کرمی ملایی - حسام عمرانپور -
Enhancing Employee Promotion Prediction with a Novel Hybrid Model Integrating Convolutional Neural Networks and Random Forest
Pouya Ardehkhani - Seyyed Reza Moslemi - Hanieh Hooshmand
KGLM-QA: A Novel Approach for Knowledge Graph-Enhanced Large Language Models for Question Answering
Alireza Akhavan safaei - Pegah Saboori - Reza Ramezani - Mohammadali Nematbakhsh
PeCoQ: A Dataset for Persian Complex Question Answering over Knowledge Graph
Romina Etezadi - Mehrnoush Shamsfard
LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent
Arash Ebrahimnezhad - Faria Nassiri-Mofakham
AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure
Tanisha Patel - Nilesh Kumar Jadav - Tejal Rathod - Sudeep Tanwar - Deepak Garg - Hossein Shahinzadeh
Extending Interaction Flow Modeling Language as a Profile for Form-making Systems
Ghazaleh Shahin - Dr Bahman Zamani
Enhancing QSAR Modeling: A Fusion of Sequential Feature Selection and Support Vector Machine
Farzaneh Khajehgili-Mirabadi - Mohammad Reza Keyvanpour
Improving Long-Term Engagement of Insurance Brokerages by Providing Gamified Configurations Based on The Delphi Method
Hosein Bayati - Fattaneh Taghiyareh - Sahand Hashemi
بهبود عنواننگاری تصویر با استفاده از روشهای یادگیری عمیق
مهدی صیادجو - محمدجواد فدائی اسلام
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.0.3