[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 12, Issue 2 (2-2024) ::
منادی 2024, 12(2): 51-59 Back to browse issues page
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an improved protocol
Javad Alizadeh , Seyyed Hadi Noorani Asl *
Fath Center, Faculty of Computer, Network and Communication, Imam Hosein University, Tehran, Iran
Abstract:   (1670 Views)
The Internet of Drones (IoD) refers to the use of unmanned aerial vehicles (UAVs) connected to the Internet. This concept is a specific application of IoT. The IoD may offer opportunities, but it also poses security vulnerabilities. It is necessary to use authentication and key agreement protocols in drone communications to prevent these vulnerabilities. In 2020, Alladi et al presented an authentication and key agreement protocol based on physical unclonable functions called SecAutUAV. They analyzed the security of their scheme through both formal and informal methods. In this paper, we demonstrate the vulnerability of the SecAuthUAV protocol to a key recovery attack. An adversary can obtain a session key between a drone and a ground station by intercepting and analyzing the session data. In addition, we present a secret value recovery attack with complexity , which is lower than the complexity of brute force attacks. An adversary could spoof and track the drone by using these values. In order to improve the security and efficiency of SecAuthUAV, we present a new version and compare it to the original. We utilize both the informal method and formal-based ProVerif to analyze the
security of the latest protocol. To compare the efficiency of the new protocol and SecAuthUAV, we counted their number of operators and functions. The new protocol is more secure and efficient than SecAutUAV.
Keywords: Network of drones, Authentication and key agreement, protocol, Key recovery attack, Forgery attack
Full-Text [PDF 1058 kb]   (446 Downloads)    
Type of Study: Research Article | Subject: Special
Received: 2023/10/15 | Accepted: 2024/02/29 | Published: 2024/02/29
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Alizadeh J, Noorani Asl S H. Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an improved protocol. منادی 2024; 12 (2) :51-59
URL: http://monadi.isc.org.ir/article-1-253-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 12, Issue 2 (2-2024) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 39 queries by YEKTAWEB 4660