With the development of sensor technology, IoT (Internet of Things) is widely used in people’s daily life such as smart home, military service, medical network, and etc. However, IoT devices are attached in specific areas, which cannot display its o...
With the development of sensor technology, IoT (Internet of Things) is widely used in people’s daily life such as smart home, military service, medical network, and etc. However, IoT devices are attached in specific areas, which cannot display its own ability. Therefore, drone technology has emerged nowadays and researchers have applied drones to the IoT, which is called as IoD (Internet of Drones). In 2020, Hussain et al. proposed an elliptic curve cryptography (ECC) based on authentication protocol for IoD environments.
However, we f ind that their scheme is vulnerable to insider and ephemeral secret leakage (ESL) attacks.
Moreover, their scheme requires high computation costs because of using ECC. To surmount security vulnerabilities and computation cost problem of Hussain et al.‘s scheme, we propose a secure authentication scheme for IoD environments. Our scheme requires low computation costs using only hash functions and exclusive-OR (XOR) operations. We also utilized biometrics to ensure the security level of our scheme. To prove our scheme’s security features, we use informal analysis and AVISPA simulation tool. The result shows that our scheme can provide better security properties and efficiency than the other related scheme.
Therefore, We demonstrate that our scheme is suitable to IoD environments.