Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 314))

Abstract

Internet of Things (IoT) is widely utilized to plenty of domains such as agriculture and meteorology. IoT technologies can be applied to drones to form Internet of Drones (IoD). In IoD, drones can help the government to gather or transmit data for disaster relief, investigation of terrain, military, fire detection and so on. In order to protect the security of data transmission for IoD, Zhang et al. proposed a lightweight authentication and key agreement scheme by using only XOR operation and one-way hash function to resist known attacks. They claimed that their scheme could effectively reduce communication and computation cost. After analyzing their scheme, we find that their scheme is vulnerable to compromised user anonymity, denial-of-service attack and replay attack. In this paper, how these found security flaws threaten Zhang et al.’s scheme is shown in detail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Won, J., Seo, S.H., Bertino, E.: Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 5, 3721–3749 (2017)

    Article  Google Scholar 

  2. Semal, B., Markantonakis, K., Akram, R.N.: A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), pp. 1–8. IEEE Press, London (2018)

    Google Scholar 

  3. Cheon, J.H., Han, K., Hong, S.M., Kim, H.J., Kim, J., Kim, S., Seo, H., Shim, H., Song, Y.: Toward a secure drone system: Flying with real-time homomorphic authenticated encryption. IEEE Access 6, 24325–24339 (2018)

    Article  Google Scholar 

  4. Alsamhi, S.H., Ma, O., Ansari, M.S., Almalki, F.A.: Survey on collaborative smart drones and internet of things for improving smartness of smart cities. IEEE Access 7, 128125–128152 (2019)

    Article  Google Scholar 

  5. Choudhary, G., Sharma, V., You, I.: Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Comput. Electr. Eng. 74, 59–73 (2019)

    Article  Google Scholar 

  6. Zhang, Y., He, D., Li, L., Chen, B.: A lightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 154, 455–464 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by Ministry of Science and Technology under the Grants MOST 109-2410-H-025-013-, MOST 110-2221-E-025-012-, MOST 108-2221-E-034-006-MY2, and MOST 110-2221-E-034-005-MY2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-Liang Tai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chang, YF., Huang, SJ., Chen, GX., Tai, WL. (2023). A Critique of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones. In: Tsihrintzis, G.A., Wang, SJ., Lin, IC. (eds) 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications. Smart Innovation, Systems and Technologies, vol 314. Springer, Cham. https://doi.org/10.1007/978-3-031-05491-4_34

Download citation

Publish with us

Policies and ethics