Skip to main content
Log in

Authentication protocols for the internet of drones: taxonomy, analysis and future directions

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The Internet of Drones (IoD) provides the coordinated access to controlled airspace for the Unmanned Aerial Vehicles (called drones). The on-going cheaper costs of sensors and processors, and also wireless connectivity make it feasible to use the drones for several applications ranging from military to civilian. Since most of the applications using the drones involved in the IoD are real-time based applications, the users (external parties) usually have their interest in getting the real-time services from the deployed drones belonging to a particular fly zone. To address this important issue in the IoD, there is a great need of an efficient and secure user authentication approach in which an authorized user (for example, a driver of an ambulance) in the IoD environment can be given access to the data directly from an accessed drone. In this article, we first discuss an authentication model used in the IoD communication. We then discuss some security challenges and requirements for the IoD environment. A taxonomy of various security protocols in the IoD environment is also discussed. We then emphasis on the study of some recently proposed user authentication schemes for the IoD communication. A detailed comparative study is done based on functionality features, security attacks, and also communication and computation costs. Through the rigorous comparative study of the existing schemes, we identify the strengths and weaknesses of the user authentication schemes for the IoD communication. Finally, we identify some of the challenges for the IoD that need to be addressed in the coming future.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

(Adapted from Wikipedia 2018)

Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Drones (2018) http://www.h3dynamics.com/products/. Accessed June 2018

  • Secure Hash Standard (2018) FIPS PUB 180-1, National Institute of Standards and Technology (NIST), US Department of Commerce, April 1995. https://doi.org/10.6028/NIST.FIPS.180-4. Accessed Jul 2018

  • Unmanned Aerial Vehicle (2018) http://www.wikiwand.com/en/ Unmanned_aerial_vehicle. Accessed June 2018

  • Amin R, Islam SKH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62

    Article  Google Scholar 

  • Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International conference on the theory and applications of cryptographic techniques—advances in cryptology (EUROCRYPT 2001). Springer, Innsbruck (Tyrol), Austria, pp 453–474

  • Canetti R, Krawczyk H (2002) Universally Composable Notions of Key Exchange and Secure Channels. In: International conference on the theory and applications of cryptographic techniques—advances in cryptology (EUROCRYPT 2002). The Netherlands, Amsterdam, pp 337–351

  • Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043

    Article  Google Scholar 

  • Das AK (2012) A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int J Inf Secur 11(3):189–211

    Article  Google Scholar 

  • Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the advances in cryptology (Eurocrypt’04), LNCS, Interlaken, Switzerland, vol 3027, pp 523–540

  • Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  MATH  Google Scholar 

  • Eschenauer L, Gligor VD (2002) A key management scheme for distributed sensor networks. In: 9th ACM conference on computer and communication security (CCS’02). Washington, DC, USA, pp 41–47

  • Farash MS, Turkanovic M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36:152–176

    Article  Google Scholar 

  • Gharibi M, Boutaba R, Waslander SL (2016) Internet of drones. IEEE Access 4:1148–1162

    Article  Google Scholar 

  • Hall RJ (2016) An Internet of drones. IEEE Internet Comput 20(3):68–73

    Article  Google Scholar 

  • Hassanalian M, Abdelkefi A (2017) Classifications, applications, and design challenges of drones: a review. Prog Aerosp Sci 91:99–131

    Article  Google Scholar 

  • Huang HF (2009) A novel access control protocol for secure sensor networks. Comput Stand Interfaces 31:272–276

    Article  Google Scholar 

  • Lin C, He D, Kumar N, Choo KKR, Vinel A, Huang X (2018) Security and privacy for the internet of drones: challenges and solutions. IEEE Commun Mag 56(1):64–69

    Article  Google Scholar 

  • Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inf Syst Secur 8(1):41–77

    Article  Google Scholar 

  • Motlagh NH, Taleb T, Arouk O (2016) Low-altitude unmanned aerial vehicles-based internet of things services: comprehensive survey and future perspectives. IEEE Internet Things J 3(6):899–922

    Article  Google Scholar 

  • Nagel H, Bondt G, Custers B (2016) Drone technology: types, payloads, applications, frequency spectrum issues and future developments. In: The future of drone use opportunities and threats from ethical and legal perspectives, vol 27, Springer Gabler Verlag, chap 2, pp 21–45

  • Odelu V, Das AK, Wazid M, Conti M (2018) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9(3):1900–1910

    Google Scholar 

  • Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25,110–25,125

    Article  Google Scholar 

  • Srinivas J, Das AK, Kumar N, Rodrigues J (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Depend Secur Comput. https://doi.org/10.1109/TDSC.2018.2828306

    Google Scholar 

  • Turkanovic M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  • Vanstone S (1992) Responses to NIST’s proposal. Commun ACM 35(7):50–52

    Google Scholar 

  • Wang D, He D, Wang P, Chu CH (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 12(4):428–442

    Article  Google Scholar 

  • Wazid M, Das AK, Kumari S, Khan MK (2016) Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur Commun Netw 9(17):4596–4614

    Article  Google Scholar 

  • Won J, Seo SH, Bertino E (2017) Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 5:3721–3749

    Article  Google Scholar 

  • Zhou Y, Zhang Y, Fang Y (2007) Access control in wireless sensor networks. Ad Hoc Netw 5:3–13

    Article  Google Scholar 

  • Zhu S, Setia S, Jajodia S (2006) LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sens Netw 2(4):500–528

    Article  Google Scholar 

Download references

Acknowledgements

The work of J.-H. Lee was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2017R1A1A1A05001405). This work of A. K. Das was also supported by the Information Security Education and Awareness (ISEA) Phase II Project, Department of Electronics and Information Technology (DeitY), India. We thank the anonymous experts of the field for their valuable comments which helped us to improve the content, quality, and presentation of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Hyouk Lee.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliation

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wazid, M., Das, A.K. & Lee, JH. Authentication protocols for the internet of drones: taxonomy, analysis and future directions. J Ambient Intell Human Comput (2018). https://doi.org/10.1007/s12652-018-1006-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-018-1006-x

Keywords

Navigation