A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles
نویسندگان
چکیده
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although collected data some of these application domains are sensitive, public channels deployed during communication process. Therefore, many protocols been presented to preserve confidentiality integrity exchanged messages. However, numerous security performance challenges noted majority protocols. In this paper, an elliptic curve cryptography (ECC) symmetric key-based protocol is presented. The choice ECC was informed by its relatively shorter key sizes compared other asymmetric encryption algorithms Rivest–Shamir–Adleman (RSA) algorithm. Security analysis showed that provides mutual authentication, session agreement, untraceability, anonymity, forward secrecy, backward biometric privacy. addition, it robust against smart card loss, password guessing, known secret temporary information (KSSTI), privileged insider, side-channeling, impersonation, denial-of-service (DoS), man-in-the-middle (MitM) attacks. comparative evaluation has low computation, storage, complexities.
منابع مشابه
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...
متن کاملAn Elliptic Curve Cryptography based Authentication and Key Agreement Protocol for Wireless Communication
We propose an authentication and key agreement protocol for wireless communication based on elliptic curve cryptographic techniques. The proposed protocol requires signi cantly less bandwidth than the Aziz-Di e and Beller-Chang-Yacobi protocols, and furthermore, it has lower computational burden and storage requirements on the user side. The use of elliptic curve cryptographic techniques provid...
متن کاملA Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we propose a robust authentication protocol based on Elliptic Curve Cryptography (ECC), which meets the requirement of resource-limited RFID systems. Our protocol achieves mutual authentication and possesses lightweight feature by reducing th...
متن کاملAn Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System
Wireless Body Area Networks (WBANs) has been recognized as one of the promising wireless sensor technologies for improving healthcare service thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make it potential users worry about the leakage of their privat...
متن کاملA Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12173688