0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
نویسندگان :
Neda Toghraee
1
Hamid Mala
2
1- University of Isfahan
2- University of Isfahan
کلمات کلیدی :
Authentication،Internet of Drones،Key agreement،Perfect forward secrecy،Security
چکیده :
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeting, and film production. As the Internet of Drones (IoD) ecosystem expands, ensuring secure and real-time access for authorized users becomes increasingly vital. User and drone authentication is crucial for this reason. In response to these challenges, Srinivas et al. proposed a lightweight three-factor authentication protocol designed for the IoD. While the authors assert that their protocol is resilient against known cyber threats, our research identifies critical vulnerabilities that challenge this claim. Although this scheme has already been cryptanalyzed in previous studies, in this paper we propose two new attacks on this scheme. Firstly, we present a concrete attack against the perfect forward secrecy of this scheme, and then we show that it is vulnerable to unauthorized access attack by a valid user to an unauthorized area's information. These weaknesses highlight the pressing need for the development of more secure authentication mechanisms in the IoD environment. Moving forward, addressing these vulnerabilities will be essential for fostering trust and ensuring the safe integration of drones into various applications, ultimately contributing to the advancement of IoD technology.
لیست مقالات
لیست مقالات بایگانی شده
Improving Privacy Protection in a Collaborative Blockchain-based E-Health Records System
Arman Emam-Hoseini - Samane Sobuti - دکتر سیاوش خرسندی - Alireza Hashemi-Golpayeghani
Presentation of a New Decoder Based on Quantum Cellular Automata Technology Along with an Analysis of Energy Consumption
- - -
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
STANet: Spatio-Temporal Attention-Enhanced WaveNet for Crime Hotspot Prediction
Rojan Roshankar - Mohammad Reza Keyvanpour
A Community-Based Method for Identifying Influential Nodes using Network Embedding
Nargess Vafaei - Dr Mohammad Reza Keyvanpour
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
Stock Market Prediction Using Hard and Soft Data Fusion
Saeed Mohammadi Dashtaki - Masoud Alizadeh - Behzad Moshiri
AI-based Message Spam Classification Framework for Secure Autonomous Vehicles Communication
Riya Upadhyay - Mili Virani - Lakshit Pathak - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
Target-driven Navigation of a Mobile Robot using an End-to-end Deep Learning Approach
Mohammad Matin Hosni - Ali Kheiri - Esmaeil Najafi
دستهبندی متون خبری فارسی با یادگیری فعال
مینا طباطبائی - دکتر سعیده ممتازی
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 40.3.1