0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Authors :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
Keywords :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
Abstract :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
Papers List
List of archived papers
استخراج موارد آزمون سطح برونمتد و درونکلاس از برنامههای شئگرا
محمد قرشی - حسن حقیقی
Knowledge Graph Based Retrieval-Augmented Generation for Multi-Hop Question Answering Enhancement
Mahdi Amiri Shavaki - Pouria Omrani - Ramin Toosi - Mohammad Ali Akhaee
IoMT-Enabled Smart Healthcare: State-of-the-Art, Security and Future Directions
Shivam Tripathi - Vatsalkumar Makwana - Malaram Kumhar - Harshal Trivedi - Jitendra Bhatia - Sudeep Tanwar - Hossein Shahinzadeh
امنیت در اینترنت اشیا؛ معماری، کاربردها، چالشها و راهکارها
مهدی موسی وند - دکتر پیام محمودی نصر مهدی موسی وند - پیام محمودی نصر -
A Novel Decentralized Privacy Preserving Federated Learning Model for Healthcare Applications
Saba Ameri - Reza Ebrahimi Atani
A perceptual loss for screen content image super-resolution
Hossein Sekhavaty-Moghadam - Marzieh Hosseinkhani - Dr Azadeh Mansouri
Simulanteus Load Balancing of Servers and Controllers in SDN-based IoMT
Somaye Imanpour - Ahmadreza Montazerolghaem - Saeed Afahari
بهبود عنواننگاری تصویر با استفاده از روشهای یادگیری عمیق
مهدی صیادجو - محمدجواد فدائی اسلام
LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent
Arash Ebrahimnezhad - Faria Nassiri-Mofakham
Improving Training Stability in Variational Autoencoders Through the Integration of Score Matching Loss
Amirreza Mokhtari Rad - Pouya Ardehkhani - Hormehr Alborzi
more
Samin Hamayesh - Version 41.3.1