当前位置: X-MOL 学术Comput. Stand. Interfaces › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Designing secure and lightweight user access to drone for smart city surveillance
Computer Standards & Interfaces ( IF 5 ) Pub Date : 2021-08-10 , DOI: 10.1016/j.csi.2021.103566
Sajid Hussain 1 , Khalid Mahmood 2 , Muhammad Khurram Khan 3 , Chien-Ming Chen 4 , Bander A. Alzahrani 5 , Shehzad Ashraf Chaudhry 6
Affiliation  

The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to reach inaccessible and hard to access sites and can save lot of effort, time and cost. However, in addition to traditional threats, the IoD may suffer from new threats and requires customized methods to combat the security weaknesses. Very recently, Wazid et al. proposed a security solution for securing IoD application scenario and claimed its security. However, in this paper we show that their scheme cannot resist stolen verifier and traceability attacks. Moreover, an attacker with access to the verifier, can impersonate any user, drone or server of the system. An enhanced scheme is then proposed to cope with these weaknesses. The security claims of proposed scheme are endorsed by formal and informal security analysis. Moreover, the performance and security comparisons show that proposed scheme completes a cycle of authentication with a slight increase in computation time, but it offers all the required security features as compared with the scheme of Wazid et al.



中文翻译:

为智能城市监控设计安全、轻量级的无人机用户访问权限

无人机互联网(IoD)是物联网(IoT)的一个非常有用的应用,它可以通过包括智慧城市监控在内的各种功能来帮助日常生活的舒适度。IoD 可以提高到达难以访问和难以访问的站点的舒适度,并可以节省大量的精力、时间和成本。然而,除了传统威胁之外,IoD 还可能受到新威胁的影响,需要定制的方法来对抗安全弱点。最近,Wazid 等人。提出了一种保护 IoD 应用场景的安全解决方案,并声称其安全性。然而,在本文中,我们表明他们的方案无法抵抗被盗验证者和可追溯性攻击。此外,可以访问验证器的攻击者可以冒充系统的任何用户、无人机或服务器。然后提出了一种增强方案来应对这些弱点。所提议方案的安全声明得到正式和非正式安全分析的认可。此外,性能和安全性比较表明,所提出的方案在计算时间略有增加的情况下完成了一个身份验证周期,但与 Wazid 等人的方案相比,它提供了所有必需的安全特性。

更新日期:2021-08-21
down
wechat
bug