-
CiteScore
-
Impact Factor
Volume 1, Issue 4, ICCK Transactions on Advanced Computing and Systems
Volume 1, Issue 4, 2024
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Advanced Computing and Systems, Volume 1, Issue 4, 2024: 1-16

Open Access | Research Article | 27 November 2024
Advanced Hyperelliptic Curve-Based Authentication Protocols for Secure Internet of Drones Communication
1 Department of Computer Science, Qurtuba University of Science and Information Technology, 25000 Peshawar, Pakistan
2 Department of Computer Science and Engineering, Sejong University, Seoul 05006, Republic of Korea
3 College of Mechatronics and Control Engineering, Shenzhen University, Shenzhen 518060, China
* Corresponding Author: Zeeshan Ali Haider, [email protected]
Received: 13 September 2024, Accepted: 22 November 2024, Published: 27 November 2024  
Abstract
The concept of an Internet of Drones (IoD) is becoming increasingly important in various domains, including surveillance and logistics. Effective communication between the interconnected systems is the essence of the Internet of Drones, however, due to the resource constraints of drones and the dynamic nature of the operating environment, security of communication within IoD networks is indeed the top priority. Considering these challenges on the part of IoD communication, a novel Hyperelliptic Curve Cryptography (HECC)-based authentication protocol is proposed in this paper to secure the data exchange between two drones and to ensure efficient communication. The proposed HECC protocol is compared with three existing protocols, Elliptic curve cryptography-based protocol with public secure authentication scheme (ECCCPSAS), Non-linear wireless unmanned aerial systems authentication scheme (NLWUAS), and the Multi-Agent System (MAS). The comparison is made among average performance metrics such as communication overhead, packet delivery ratio, throughput, and end-to-end delay. The experimental outcome assures that the HECC protocol outperforms the other protocols in terms of all metrics. HECC provides Minimum communication overhead, Maximum packet delivery ratio, Maximum throughput, and Minimum end-to-end delay. The HECC-based authentication protocol enhances communication security in IoD networks by reducing computational overload as well as improving packet delivery, and is beneficial for resource-constrained environments like drones. This efficiency is particularly valuable in practical scenarios like autonomous fleets of drones for observation or delivery, as it reduces delays and energy use. It is suggested by the results of our study that, for drone communication in IoD networks, HECC is a much more secure and scalable solution as compared to all other alternatives. Ongoing research will focus on the practical deployment of the protocol and support for future quantum-resistant algorithms.

Graphical Abstract
Advanced Hyperelliptic Curve-Based Authentication Protocols for Secure Internet of Drones Communication

Keywords
hyperelliptic curve cryptography
internet of drones (IoD)
authentication protocol
cryptographic protocols
drone communication networks
security in IoD

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Berini, A. D. E., Ferrag, M. A., Farou, B., & Seridi, H. (2023). HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones. Pervasive and Mobile Computing, 92, 101798.
    [CrossRef]   [Google Scholar]
  2. Gilani, S. M., Anjum, A., Khan, A., Syed, M. H., Moqurrab, S. A., & Srivastava, G. (2024). A robust Internet of Drones security surveillance communication network based on IOTA. Internet of Things, 25, 101066.
    [CrossRef]   [Google Scholar]
  3. Adeniyi, A. E., Jimoh, R. G., & Awotunde, J. B. (2024). A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security. Computers and Electrical Engineering, 118, 109330.
    [CrossRef]   [Google Scholar]
  4. Di, X., Sun, Y., Lu, J., Dai, W., & Qi, H. (2023, June). Blockchain-based authentication scheme for vehicle network nodes. In 2023 International Conference on Blockchain Technology and Information Security (ICBCTIS) (pp. 204-210). IEEE.
    [CrossRef]   [Google Scholar]
  5. Wu, Q., Li, X., Wang, K., & Bilal, H. (2023). Regional feature fusion for on-road detection of objects using camera and 3D-LiDAR in high-speed autonomous vehicles. Soft Computing, 27(23), 18195-18213.
    [CrossRef]   [Google Scholar]
  6. Kumar, A., Wang, S., Shaikh, A. M., Bilal, H., Lu, B., & Song, S. (2024). Building on prior lightweight CNN model combined with LSTM-AM framework to guide fault detection in fixed-wing UAVs. International Journal of Machine Learning and Cybernetics, 15(9), 4175-4191.
    [CrossRef]   [Google Scholar]
  7. Farrea, K. A., Baig, Z., Doss, R. R. M., & Liu, D. (2024). Provably secure optimal homomorphic signcryption for satellite-based internet of things. Computer Networks, 250, 110516.
    [CrossRef]   [Google Scholar]
  8. Taji, K., & Ghanimi, F. (2024). Enhancing security and privacy in smart agriculture: A novel homomorphic signcryption system. Results in Engineering, 22, 102310.
    [CrossRef]   [Google Scholar]
  9. Hawashin, D., Nemer, M., Gebreab, S. A., Salah, K., Jayaraman, R., Khan, M. K., & Damiani, E. (2024). Blockchain applications in UAV industry: Review, opportunities, and challenges. Journal of Network and Computer Applications, 230, 103932.
    [CrossRef]   [Google Scholar]
  10. Ullah, R., Mehmood, A., Khan, M. A., Maple, C., & Lloret, J. (2024). An optimal secure and reliable certificateless proxy signature for industrial internet of things. Peer-to-Peer Networking and Applications, 17(4), 2205-2220.
    [CrossRef]   [Google Scholar]
  11. Abdelmaboud, A. (2021). The internet of drones: Requirements, taxonomy, recent advances, and challenges of research trends. Sensors, 21(17), 5718.
    [CrossRef]   [Google Scholar]
  12. Ma, R., Cao, J., He, S., Zhang, Y., Niu, B., & Li, H. (2023). A UAV-assisted UE access authentication scheme for 5G/6G network. IEEE Transactions on Network and Service Management, 21(2), 2426-2444.
    [CrossRef]   [Google Scholar]
  13. Sharafian, A., Ullah, I., Singh, S. K., Ali, A., Khan, H., & Bai, X. (2024). Adaptive fuzzy backstepping secure control for incommensurate fractional order cyber–physical power systems under intermittent denial of service attacks. Chaos, Solitons & Fractals, 186, 115288.
    [CrossRef]   [Google Scholar]
  14. Haider, Z. A., Khan, F. M., Zafar, A., & Khan, I. U. (2024). Optimizing Machine Learning Classifiers for Credit Card Fraud Detection on Highly Imbalanced Datasets Using PCA and SMOTE Techniques. VAWKUM Transactions on Computer Sciences, 12(2), 28-49.
    [CrossRef]   [Google Scholar]
  15. Pirayesh, J., Giaretta, A., Conti, M., & Keshavarzi, P. (2022). A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216, 109077.
    [CrossRef]   [Google Scholar]
  16. Munasinghe, I., Perera, A., & Deo, R. C. (2024). A comprehensive review of uav-ugv collaboration: Advancements and challenges. Journal of Sensor and Actuator Networks, 13(6), 81.
    [CrossRef]   [Google Scholar]
  17. Aslam, M. S., Bilal, H., Chang, W. J., Yahya, A., Badruddin, I. A., Kamangar, S., & Hussien, M. (2024). Formation control of heterogeneous multi-agent systems under fixed and switching hierarchies. IEEE Access, 12, 97868-97882.
    [CrossRef]   [Google Scholar]
  18. Bai, X., Ye, Y., Zhang, B., & Ge, S. S. (2023). Efficient package delivery task assignment for truck and high capacity drone. IEEE Transactions on Intelligent Transportation Systems, 24(11), 13422-13435.
    [CrossRef]   [Google Scholar]
  19. Arthur, M. P. (2019, August). Detecting signal spoofing and jamming attacks in UAV networks using a lightweight IDS. In 2019 international conference on computer, information and telecommunication systems (CITS) (pp. 1-5). IEEE.
    [CrossRef]   [Google Scholar]
  20. Askerbekov, D., Garza-Reyes, J. A., Ghatak, R. R., Joshi, R., Kandasamy, J., & de Mattos Nascimento, D. L. (2024). Embracing drones and the Internet of drones systems in manufacturing–An exploration of obstacles. Technology in Society, 78, 102648.
    [CrossRef]   [Google Scholar]
  21. Kharchenko, V., & Torianyk, V. (2018, May). Cybersecurity of the internet of drones: Vulnerabilities analysis and imeca based assessment. In 2018 IEEE 9th international conference on dependable systems, services and technologies (DESSERT) (pp. 364-369). IEEE.
    [CrossRef]   [Google Scholar]
  22. Grieco, G., Iacovelli, G., Boccadoro, P., & Grieco, L. A. (2022). Internet of drones simulator: Design, implementation, and performance evaluation. IEEE Internet of Things Journal, 10(2), 1476-1498.
    [CrossRef]   [Google Scholar]
  23. Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., ... & Khan, F. A. (2023). Internet of drones security: Taxonomies, open issues, and future directions. Vehicular Communications, 39, 100552.
    [CrossRef]   [Google Scholar]
  24. Fang, Z., & Savkin, A. V. (2024). Strategies for optimized uav surveillance in various tasks and scenarios: A review. Drones, 8(5), 193.
    [CrossRef]   [Google Scholar]
  25. Zhang, C., Shan, G., Lim, J., & Roh, B. H. (2024). Dynamic Reinforcement Learning for Optimal Go AI Training: Adaptive Adjustment and Optimization. IEEE Transactions on Consumer Electronics, 71(1), 292-302.
    [CrossRef]   [Google Scholar]
  26. Aboueleneen, N., Alwarafy, A., & Abdallah, M. (2023). Deep reinforcement learning for internet of drones networks: Issues and research directions. IEEE Open Journal of the Communications Society, 4, 671-683.
    [CrossRef]   [Google Scholar]
  27. Pandey, G. K., Gurjar, D. S., Yadav, S., Jiang, Y., & Yuen, C. (2024). UAV-assisted communications with RF energy harvesting: A comprehensive survey. IEEE Communications Surveys & Tutorials, 27(2), 782-838.
    [CrossRef]   [Google Scholar]
  28. Hussain, S., Farooq, M., Alzahrani, B. A., Albeshri, A., Alsubhi, K., & Chaudhry, S. A. (2023). An efficient and reliable user access protocol for Internet of Drones. IEEE Access, 11, 59688-59700.
    [CrossRef]   [Google Scholar]
  29. Chen, Y., Yin, F., Hu, S., Sun, L., Li, Y., Xing, B., ... & Guo, B. (2022). ECC-based authenticated key agreement protocol for industrial control system. IEEE Internet of Things Journal, 10(6), 4688-4697.
    [CrossRef]   [Google Scholar]
  30. Lara-Nino, C. A., Diaz-Perez, A., & Morales-Sandoval, M. (2018). Elliptic curve lightweight cryptography: A survey. Ieee Access, 6, 72514-72550.
    [CrossRef]   [Google Scholar]
  31. Javed, S., Hassan, A., Ahmad, R., Ahmed, W., Ahmed, R., Saadat, A., & Guizani, M. (2024). State-of-the-art and future research challenges in uav swarms. IEEE Internet of Things Journal, 11(11), 19023-19045.
    [CrossRef]   [Google Scholar]
  32. Kumar, A., de Jesus Pacheco, D. A., Kaushik, K., & Rodrigues, J. J. (2022). Futuristic view of the internet of quantum drones: review, challenges and research agenda. Vehicular Communications, 36, 100487.
    [CrossRef]   [Google Scholar]
  33. Mishra, D., Singh, M., Rewal, P., Pursharthi, K., Kumar, N., Barnawi, A., & Rathore, R. S. (2023). Quantum-safe secure and authorized communication protocol for internet of drones. IEEE Transactions on Vehicular Technology, 72(12), 16499-16507.
    [CrossRef]   [Google Scholar]
  34. Yasmine, G., Maha, G., & Alaoui, A. E. H. (2023, December). Anti-drone systems: Current intelligent countermeasures from low to high risks. In 2023 7th IEEE Congress on Information Science and Technology (CiSt) (pp. 317-322). IEEE.
    [CrossRef]   [Google Scholar]
  35. Heidari, A., Navimipour, N. J., & Unal, M. (2023). A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet of Things Journal, 10(10), 8445-8454.
    [CrossRef]   [Google Scholar]
  36. Yang, W., Wang, S., Yin, X., Wang, X., & Hu, J. (2022). A review on security issues and solutions of the internet of drones. IEEE Open Journal of the Computer Society, 3, 96-110.
    [CrossRef]   [Google Scholar]
  37. Meng, X., Yang, H., Zhang, G., Wang, D., & Liu, X. (2022, September). Operation and Maintenance Interaction of Information System Based on Artificial Intelligence and Big Data. In International Conference on Cognitive based Information Processing and Applications (pp. 331-338). Singapore: Springer Nature Singapore.
    [CrossRef]   [Google Scholar]
  38. Jamil, S., Rahman, M., & Fawad. (2022). A comprehensive survey of digital twins and federated learning for industrial internet of things (IIoT), internet of vehicles (IoV) and internet of drones (IoD). Applied System Innovation, 5(3), 56.
    [CrossRef]   [Google Scholar]
  39. Dang, L. M., Danish, S., Khan, A., Alam, N., Fayaz, M., Nguyen, D. K., ... & Moon, H. (2024). An efficient zero-labeling segmentation approach for pest monitoring on smartphone-based images. European Journal of Agronomy, 160, 127331.
    [CrossRef]   [Google Scholar]
  40. Akram, J., Anaissi, A., Othman, W., Alabdulatif, A., & Akram, A. (2024). Dronessl: Self-supervised multimodal anomaly detection in internet of drone things. IEEE Transactions on Consumer Electronics, 70(1), 4287-4298.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Haider, Z. A., Fayaz, M., Zhang, Y., & Ali, A. (2024). Advanced Hyperelliptic Curve-Based Authentication Protocols for Secure Internet of Drones Communication. ICCK Transactions on Advanced Computing and Systems, 1(4), 1–16. https://doi.org/10.62762/TACS.2024.926789

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 68
PDF Downloads: 27

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2024 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Advanced Computing and Systems

ICCK Transactions on Advanced Computing and Systems

ISSN: 3068-7969 (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/