0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
نویسندگان :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
کلمات کلیدی :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
چکیده :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
لیست مقالات
لیست مقالات بایگانی شده
A Multi-Task Framework Using Mamba for Identity, Age, and Gender Classification from Hand Images
Amirabbas Rezasoltani - Alireza Hosseini - Ramin Toosi - MohammadAli Akhaee
طبقهبندی ترافیک رمز مبتنی بر یادگیری ماشین
افسانه معدنی - شقایق نادری - حسین قرایی
Classification of Personality Traits on Facebook Using Key Phrase Extraction, Language Models and Machine Learning
Faezeh Safari - Abdolah Chalechale
Presentation of a New Decoder Based on Quantum Cellular Automata Technology Along with an Analysis of Energy Consumption
- - -
An integrated approach for estimating software cost estimation using Adaptive Neuro-Fuzzy Inference System and the Grey Wolf Optimization algorithm
Maryam Karimi - Taghi Javdani Gandomani - Mahdi Mosleh
طراحی و کنترل تطبیقی اورتز رباتیک پایین تنه با استفاده کنترلر منطقی قابل برنامه ریزی و رابط انسان با ماشین
فرهاد عظیمی فر - ستایش کرمی - نیایش امینی
Binary water stream algorithm: a new meta-heuristic optimization technique
Faezeh Rahimi Sebdani - Mehdi Nasri
Classification and Evaluation of Privacy Preserving Data Mining Methods
Negar Nasiri - Mohammadreza Keyvanpour
Automatic identification and reconstruction of Tuberculosis in microscopic images using convolutional auto-encoder network
Ahmad Reza Nadafi - Farahnaz Mohanna
روش مهاجرت خوشهای برای بهبود بستربندی به مشتری در گردشکارهای بدون سرویسدهنده
محمدامین قسوری جهرمی - مهرداد آشتیانی - فاطمه بخشی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 41.3.1