Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone

<p dir="ltr">With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the advancement in modern strategic narratives. This has...

Full description

Saved in:
Bibliographic Details
Main Author: Saeed Ullah Jan (9079260) (author)
Other Authors: Habib Ullah Khan (12024579) (author)
Published: 2021
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513561736249344
author Saeed Ullah Jan (9079260)
author2 Habib Ullah Khan (12024579)
author2_role author
author_facet Saeed Ullah Jan (9079260)
Habib Ullah Khan (12024579)
author_role author
dc.creator.none.fl_str_mv Saeed Ullah Jan (9079260)
Habib Ullah Khan (12024579)
dc.date.none.fl_str_mv 2021-09-07T00:00:00Z
dc.identifier.none.fl_str_mv 10.1109/access.2021.3110804
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Identity_and_Aggregate_Signature-Based_Authentication_Protocol_for_IoD_Deployment_Military_Drone/24038949
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Earth sciences
Geoinformatics
Engineering
Electronics, sensors and digital hardware
Information and computing sciences
Cybersecurity and privacy
Drones
Military computing
Global Positioning System
Authentication
Security
Reconnaissance
Protocols
Aggregation
Encryption
Paring cryptography
Unforgeability
dc.title.none.fl_str_mv Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the advancement in modern strategic narratives. This has special relevance to drone-related operations. This technology can be controlled remotely by an invisible yet credible operator sitting to a powerful intelligence computer system (PICS) or an airborne control and command platform (AC2P). The two types of drones (reconnaissance and attacking) can communicate with each other and with the PICS or AC2P through wireless network channels referred to as Flying Ad Hoc Network or Unmanned Aerial Vehicular Network (FANET or UAVN). This mode of communication is not without some inconvenience. For instance, when the line of sight is broken, communication is mainly carried out through satellite using GPS (Global Positioning System) signals. Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. More importantly, the outdated data transmission flaw has also been tackled, which is of obvious concern to the past designed protocols. The security of the proposed designs is formally verified using a random oracle model (ROM), a real-or-random (ROR) model, and by informally using pragmatic illustration and mathematical lemmas. Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.</p><h3>Other Information</h3><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3110804" target="_blank">https://dx.doi.org/10.1109/access.2021.3110804</a></p>
eu_rights_str_mv openAccess
id Manara2_3238a79679eb637fc5628afdf27b6df7
identifier_str_mv 10.1109/access.2021.3110804
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24038949
publishDate 2021
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military DroneSaeed Ullah Jan (9079260)Habib Ullah Khan (12024579)Earth sciencesGeoinformaticsEngineeringElectronics, sensors and digital hardwareInformation and computing sciencesCybersecurity and privacyDronesMilitary computingGlobal Positioning SystemAuthenticationSecurityReconnaissanceProtocolsAggregationEncryptionParing cryptographyUnforgeability<p dir="ltr">With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the advancement in modern strategic narratives. This has special relevance to drone-related operations. This technology can be controlled remotely by an invisible yet credible operator sitting to a powerful intelligence computer system (PICS) or an airborne control and command platform (AC2P). The two types of drones (reconnaissance and attacking) can communicate with each other and with the PICS or AC2P through wireless network channels referred to as Flying Ad Hoc Network or Unmanned Aerial Vehicular Network (FANET or UAVN). This mode of communication is not without some inconvenience. For instance, when the line of sight is broken, communication is mainly carried out through satellite using GPS (Global Positioning System) signals. Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. More importantly, the outdated data transmission flaw has also been tackled, which is of obvious concern to the past designed protocols. The security of the proposed designs is formally verified using a random oracle model (ROM), a real-or-random (ROR) model, and by informally using pragmatic illustration and mathematical lemmas. Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.</p><h3>Other Information</h3><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3110804" target="_blank">https://dx.doi.org/10.1109/access.2021.3110804</a></p>2021-09-07T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2021.3110804https://figshare.com/articles/journal_contribution/Identity_and_Aggregate_Signature-Based_Authentication_Protocol_for_IoD_Deployment_Military_Drone/24038949CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240389492021-09-07T00:00:00Z
spellingShingle Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Saeed Ullah Jan (9079260)
Earth sciences
Geoinformatics
Engineering
Electronics, sensors and digital hardware
Information and computing sciences
Cybersecurity and privacy
Drones
Military computing
Global Positioning System
Authentication
Security
Reconnaissance
Protocols
Aggregation
Encryption
Paring cryptography
Unforgeability
status_str publishedVersion
title Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
title_full Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
title_fullStr Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
title_full_unstemmed Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
title_short Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
title_sort Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
topic Earth sciences
Geoinformatics
Engineering
Electronics, sensors and digital hardware
Information and computing sciences
Cybersecurity and privacy
Drones
Military computing
Global Positioning System
Authentication
Security
Reconnaissance
Protocols
Aggregation
Encryption
Paring cryptography
Unforgeability