Designing secure and lightweight user access to drone for smart city surveillance
dc.authorid | https://orcid.org/0000-0001-5046-7766 | en_US |
dc.authorid | https://orcid.org/0000-0001-6636-0533 | en_US |
dc.authorid | https://orcid.org/0000-0002-6502-472X | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.contributor.author | Hussain, Sajid | |
dc.contributor.author | Mahmood, Khalid | |
dc.contributor.author | Khan, Muhammad Khurram | |
dc.contributor.author | Chen, Chien-Ming | |
dc.contributor.author | Alzahrani, Bander A. | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.date.accessioned | 2023-08-05T19:41:02Z | |
dc.date.available | 2023-08-05T19:41:02Z | |
dc.date.issued | 2022 | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.description.abstract | The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to reach inaccessible and hard to access sites and can save lot of effort, time and cost. However, in addition to traditional threats, the IoD may suffer from new threats and requires customized methods to combat the security weaknesses. Very recently, Wazid et al. proposed a security solution for securing IoD application scenario and claimed its security. However, in this paper we show that their scheme cannot resist stolen verifier and traceability attacks. Moreover, an attacker with access to the verifier, can impersonate any user, drone or server of the system. An enhanced scheme is then proposed to cope with these weaknesses. The security claims of proposed scheme are endorsed by formal and informal security analysis. Moreover, the performance and security comparisons show that proposed scheme completes a cycle of authentication with a slight increase in computation time, but it offers all the required security features as compared with the scheme of Wazid et al. | en_US |
dc.identifier.doi | 10.1016/j.csi.2021.103566 | en_US |
dc.identifier.endpage | 11 | en_US |
dc.identifier.issn | 0920-5489 | |
dc.identifier.issn | 1872-7018 | |
dc.identifier.scopus | 2-s2.0-85113279390 | en_US |
dc.identifier.scopusquality | Q1 | en_US |
dc.identifier.startpage | 1 | en_US |
dc.identifier.uri | https://hdl.handle.net/11363/5174 | |
dc.identifier.uri | https://doi.org/ | |
dc.identifier.volume | 80 | en_US |
dc.identifier.wos | WOS:000697032600003 | en_US |
dc.identifier.wosquality | Q1 | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |
dc.language.iso | en | en_US |
dc.publisher | ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS | en_US |
dc.relation.ispartof | Computer Standards & Interfaces | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Three-factor authentication | en_US |
dc.subject | Smart-card capture attack | en_US |
dc.subject | Drone capture attack | en_US |
dc.subject | Provable security | en_US |
dc.subject | Smart City security | en_US |
dc.subject | IoT security | en_US |
dc.subject | Key-agreement | en_US |
dc.subject | Internet of Drones | en_US |
dc.subject | Authentications | en_US |
dc.title | Designing secure and lightweight user access to drone for smart city surveillance | en_US |
dc.type | Article | en_US |