dc.contributor.author | Hussain, Sajid | |
dc.contributor.author | Mahmood, Khalid | |
dc.contributor.author | Khan, Muhammad Khurram | |
dc.contributor.author | Chen, Chien-Ming | |
dc.contributor.author | Alzahrani, Bander A. | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.date.accessioned | 2023-08-05T19:41:02Z | |
dc.date.available | 2023-08-05T19:41:02Z | |
dc.date.issued | 2022 | en_US |
dc.identifier.issn | 0920-5489 | |
dc.identifier.issn | 1872-7018 | |
dc.identifier.uri | https://hdl.handle.net/11363/5174 | |
dc.description.abstract | The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life
comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to
reach inaccessible and hard to access sites and can save lot of effort, time and cost. However, in addition to
traditional threats, the IoD may suffer from new threats and requires customized methods to combat the security
weaknesses. Very recently, Wazid et al. proposed a security solution for securing IoD application scenario and
claimed its security. However, in this paper we show that their scheme cannot resist stolen verifier and traceability attacks. Moreover, an attacker with access to the verifier, can impersonate any user, drone or server of the
system. An enhanced scheme is then proposed to cope with these weaknesses. The security claims of proposed
scheme are endorsed by formal and informal security analysis. Moreover, the performance and security comparisons show that proposed scheme completes a cycle of authentication with a slight increase in computation
time, but it offers all the required security features as compared with the scheme of Wazid et al. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS | en_US |
dc.relation.isversionof | DOI10.1016/j.csi.2021.103566 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Three-factor authentication | en_US |
dc.subject | Smart-card capture attack | en_US |
dc.subject | Drone capture attack | en_US |
dc.subject | Provable security | en_US |
dc.subject | Smart City security | en_US |
dc.subject | IoT security | en_US |
dc.subject | Key-agreement | en_US |
dc.subject | Internet of Drones | en_US |
dc.subject | Authentications | en_US |
dc.title | Designing secure and lightweight user access to drone for smart city surveillance | en_US |
dc.type | article | en_US |
dc.relation.ispartof | Computer Standards & Interfaces | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.authorid | https://orcid.org/0000-0001-5046-7766 | en_US |
dc.authorid | https://orcid.org/0000-0001-6636-0533 | en_US |
dc.authorid | https://orcid.org/0000-0002-6502-472X | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.identifier.volume | 80 | en_US |
dc.identifier.startpage | 1 | en_US |
dc.identifier.endpage | 11 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |