Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography

نویسندگان

چکیده

Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence of a human pilot to fly. UAVs can be controlled remotely by operator or autonomously onboard computer systems. have many military uses, including battlefield surveillance, effective target tracking and engagement in air-to-ground warfare, situational awareness challenging circumstances. They also offer distinct advantage various applications such forest fire monitoring surveillance. Surveillance systems developed using advanced technologies modern era communications networks. As result, enhancements control manage efficiently. Network security is critical concern with respect due risk surveillance information theft physical misuse. Although several new tools been introduced secure networks, attackers use more methods get into UAV network create problems pose an organizational threat entire system. Security mechanisms reduce performance because some restrictive measures prevent users from accessing specific resources, but few techniques overcome problem reduction scenarios. There types attacks, i.e., denial service attacks (DOS), distributed (DDOS), address resolution protocol (ARP) spoofing, sniffing, etc., make it maintain network. This research paper proposes lightweight challenge-response authentication previously mentioned problems. provided utilizing minimum number bits memory, this technique offers same features while fewer low computing power consumption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography

The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we propose a robust authentication protocol based on Elliptic Curve Cryptography (ECC), which meets the requirement of resource-limited RFID systems. Our protocol achieves mutual authentication and possesses lightweight feature by reducing th...

متن کامل

Elliptic Curve Cryptography Based Wireless Authentication Protocol

Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...

متن کامل

Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture

Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is ...

متن کامل

Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attac...

متن کامل

Software Elliptic Curve Cryptography

In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Our implementation goals are to achieve a fast, small, and portable cryptographic library, which supports elliptic curve digital signature generation and verification. The implementation results are presented on a Pentium I1 448.81 MHz. We also consider the sliding window algorithm (S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11071026