Fuzzy Extractor N
Fuzzy Extractor N
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
I. I NTRODUCTION
M. Tanveer is with the School of Systems and Technology (SST), Uni-
versity of Management and Technology, Lahore, Pakistan. (e-mails: tan-
[email protected]).
Abdallah Aldosary is with the Department of Computer Engineering Prince
Sattam bin Abdulaziz University Wadi Addwasir 11991, Ar Riyadh, Saudi
Arabia. (e-mails: [email protected].)
Salah-ud-din Khokhar is with the School of Intelligent Manufacturing
and Control Engineering, Qilu Institute of Technology, No. 3028 Jingshi
East Road, Jinan, 250200, Shandong, PR China. (corresponding author:
[email protected].)
Ashok Kumar Das is with the Center for Security, Theory and Algorithmic
Research, International Institute of Information Technology, Hyderabad 500
032, India (e-mail: [email protected], [email protected]).
Saud Alhajaj Aldossari is with the Department of Electrical Engineering,
Prince Sattam bin Abdulaziz University Wadi Aldawsar, Ar Riyadh, Saudi
Arabia. (e-mails: [email protected].)
Shehzad Ashraf Chaudhry is with the Department of Computer Science and,
Information Technology, College of Engineering, Abu Dhabi University, Abu
Dhabi, United Arab Emirates and is also with the Department of Software Figure 1. Smart city environment.
Engineering, Faculty of Engineering and Architecture, Nisantasi University,
Istanbul, Turkey.(Email: [email protected]).
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
Table I
OVERVIEW OF W EAKNESSES OF THE E XISTING AUTHENTICATION S CHEME FOR I O D E NVIRONMENTS
Reference/Scheme Cryptographic Primitive Used Security Weaknesses/Attack Analysis
[5] SHA + AES + Exclusive-OR Susceptible to node capture, DoS attacks, de-synchronization, and replay attacks.
[6] SHA + ECC + Exclusive-OR Does not ensure user anonymity
[7] SHA + ECC + Exclusive-OR Weak against desynchronization attack.
[8] SHA + ECC + Exclusive-OR Weak against MITM and impersonation attacks.
[9] SHA + AES + Exclusive-OR Exposed to server spoofing and session key compromised attacks.
[10] SHA + Exclusive-OR Prone to stolen verifier attack.
[11] SHA + Exclusive-OR Lacks protection against session key compromise, forgery, and replay attacks.
[12] SHA + Exclusive-OR The scheme lacks the perfect backward secrecy.
[13] SHA + Exclusive-OR Not protects against replay attack.
[14] SHA + bi-linear paring + Exclusive-OR Not protected against impersonation attack.
PAF-IoD SHA + AEAD + Exclusive-OR Protection against various attacks.
scheme, the author conducts a formal security analysis using Various three-party authentication frameworks are summa-
the Scyther and ROR model, validating its effectiveness in rized in Table I.
protecting IoT device data.
The authors in [21] introduce a security framework for the III. P RELIMINARIES
IoD environment that utilizes ECC, XOR operations, and a This section is dedicated to discussing essential concepts
secure hash algorithm. They claim that this framework effec- and background information that are pertinent to the proposed
tively defends various security attacks. However, in [22], [23], framework. These preliminary explanations lay the ground-
the authors highlight the limitations of the security framework work for comprehending the subsequent content and contribute
proposed in [21]. In [24], a novel authentication framework to a comprehensive understanding of the proposed framework.
based on PUF and ECC is proposed. The security of this
framework has been verified through rigorous analysis using A. AEGIS
AVISPA and the ROR model. To establish secure communi- Selected as a finalist in the CAESAR competition, AEGIS
cation in IoD deployments, an authentication framework is is an online and lightweight AEAD algorithm that seam-
developed in [25]. This framework is constructed utilizing the lessly blends efficiency with security. Built upon the AES
AEAD and hash function to ensure robust security measures. algorithm, it optimizes the encryption and decryption pro-
In [26], an authentication technique for IoD deployment cesses by reducing the number of steps. AEGIS not only
involving three parties is introduced, which incorporates a demands less computational time compared to AES but also
chaotic map and PUF. The scheme’s security is demonstrated, integrates additional security features. This design takes into
and its validity is verified using the ROR model. Another consideration the limitations of resource-constrained devices
security protocol based on PUF is propounded in [27] to [38]. AEGIS serves as an encryption algorithm that takes
enable secure transmission within IoD deployments. In [28], the “plaintext” (P T ) as input and generates the “ciphertext”
the authors offer an identity-based proxy signcryption strategy (CT ) and authentication parameter (M C) as output. The
to handle data transfer between drones and cloud servers. operational logic for encryption and decryption of AEGIS can
The scheme’s robustness is corroborated by employing the be symbolized as “(CT, M C) = EK {{IV, AD}, P T } and
ROR model, guaranteeing its security. Furthermore, in [29], a (P T, M C1 ) = DK {{IV, AD}, CT }”, respectively, where K
PUF-enabled authentication technique is proposed, eliminating denotes the key, IV represents the “Initialization Vector”, and
the need to store secret keys in devices while maintaining AD signifies the “Associative Data”. The inclusion of M C
desired security features. Additionally, [30] presents a security guarantees the authenticity and integrity of both AD and CT .
technique for allowing secure drone-to-drone communica- In this study, we adopt AEGIS as the designated “encryp-
tion, with its security assessed using BAN logic. Various tion/decryption” algorithm. The operation of the AEGIS is
AEAD schemes are assessed in [31], and an authentication represented in Fig. 2.
framework is formulated in [32] based on one of these
AEAD schemes to secure communication within the smart Definition 1. “The maximum OCCA3 advantage of A on
grid system. Additionally, a security framework is suggested an AEAD scheme can be characterized as the sum of A’s
in [33], employing the hash function and XOR operation. advantage in integrity and chosen plaintext. This OCCA3
The authentication framework outlined in [34] lacks physical advantage of A is formally defined in [31], [32].”
capture security as it does not leverage the PUF function. In
[35], another security framework reveals several weaknesses,
OCCA3
Advφ,A (plt) ≤ AdvφOP RP −CP A (ql, le, plt)
(1)
including vulnerability to parallel session attacks, Man-in-the- +AdvφIN T −CT XT (ql, le, plt),
Middle (MITM) attacks, and impersonation attacks. Addition- In the context of an OCCA3 advantage, φ, ql, le, and plt
ally, this framework exhibits a design flaw that hinders mutual denote the AEAD scheme itself, the number of queries, the
authentication and fails to ensure user anonymity. Moreover, length of queries, and polynomial time, respectively.
the security framework proposed in [36] is susceptible to
drone capture and insider attacks, lacking features such as user
anonymity, message integrity, and confidentiality. Similarly, B. Physical Uncloneable Function
the scheme introduced in [37] is vulnerable to MITM attacks PUFs depend on the intrinsic physical properties of a
and temporary secret leakage. device, such as deviations in delay or impedance generated
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
B. Threat Model
To evaluate the security strength of PAF-IoD, the widely
operated Dolev-Yao (DY) model is operated. The DY model
presumes that an adversary, represented as A, can intercept
any message disseminated over a public or shared channel.
A can then revise and re-transmit elements of the message
to a respective network entity. Additionally, the DY model
takes into account that A can potentially procure data from
the smart device of the user by manipulating power analysis
attacks. Furthermore, the CK-adversary model is employed
in the evaluation. Under this model, A is allowed to engage
Figure 2. Encryption and decryption of AEGIS algorithm. in a message interaction with other network nodes, enabling
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
Algorithm 4 Verification of M G3 checks the condition M C3 ==M C3∗ . If it holds, then Dk gets
Input: {T3 , Q11 , Q12 , Q13 , Q14 , Q15 , M C4 and {Q1 , RA3 } P4 = (Z1 , Z2 , Z3 , Z4 , Z5 ). In addition, Dk proceeds with the
Output: {SKDk and authentication successful}
1: procedure VM({T3 , Q11 , Q12 , Q13 , Q14 , Q15 , M C4 , {Q1 , RA3 }), authentication process by selecting RA4 and T3 . Moreover,
2: if Td ≤ |Tr − T3 | then Dk computes associative data AD6 , encryption key K2 , and
3: AD6∗ ← (SIDDk ⊕ RA2 ⊕ Q∗ 1 ⊕ IDUi ),
4: K3 ← (ZZ1 = RA2 ⊕ Q∗ 1 ⊕ IDUi ),
plaintext P4 . To achieve encrypting the communication with
5: (P5 , M C5 )) ← DK3 {(IV6 , AD6∗ ), CT1 },
∗ ∗
the user, Dk calculates the session key SKDk and session
6: if M C5 ==M C5∗ then,
7: P5 = {P4 , Z2 , Z3 , Z4 , SKv }, key verification parameter SKv . Finally, Dk computes CT1
8: SKDk ← H(ZZ1 ∥ P4 ∥ T3 ∥ AD7 ), and M C4 using the AEGIS encryption algorithm, where
9: SKv1 ← H(SKDk ),
10: if SKv ==SKv1 then, P5 = {P4 , Z2 , Z3 , Z4 , SKv }.
11: Qnr1 ← Z2 ⊕ RA2 , 4) Step ALG-4: The algorithm 4 is executed by the SDi
12: Qnr2 ← Z3 ⊕ RA2 ,
13: M Crn ← Z4 ⊕ RA2 , after receiving M G3 from the Dk . In algorithm 4, the proce-
14: P Trn ← {Qn n n
r1 , Qr2 , M Cr }, dure VM starts after taking the parameters {T3 , Q11 , Q12 , Q13 ,
15: (CTrn , M Cr1n
) ← EQ∗ {(IV2n , AD2n ), P Trn },
16: Update {CTrn , M Cr1 n 2 ∗
} with {CTr , M Cr1 } Q14 , Q15 , M C4 and {Q1 , RA3 } as the input and generates the
17: Both session keys are the same “authentication success message” and session key SKUi . The
18: Authentication successful
19: else line ⃝2 of algorithm 4 ensures timeliness of M G3 by checking
20: Execution terminated the condition Td ≤ |Tr −T3 |. If the condition on line ⃝ 2 holds,
21: end if
22: else then Ui computes associative data AD7 and decryption key
23: Execution terminated K3 on line ⃝ 3 and ⃝,4 respectively. On line ⃝,5 the decryption
24: end if
25: else process is performed after taking the ciphertext CT1 and K3
26: Execution terminated as the input parameters and generates plaintext P5 and M C5 ,
27: end if
28: end procedure where CT1 ={ Q11 , Q12 , Q13 , Q14 , Q15 }.
AEGIS decryption algorithm needs to check the condition
M C5 ==M C5∗ on line ⃝ 6 to check the integrity of the returned
plaintext P5 = {P4 , Z2 , Z3 , Z4 , SKv }. The session key is
Here, SIDDk refers to Dk from where the Ui requires
computed on line ⃝ 8 and the verification parameter for the
⃝
accessing the real-time information. If the condition on line 16
session key is computed on line number ⃝. 9 The verification
holds, then GSj retrieves CTDk and M CDk . Moreover, GSj
∗ parameter is used to check both the session keys device at Dk
computes PDk and M CD by using the AEGIS decryption
k and Ui are the same. For this purpose, a condition is checked
algorithm. The size of Kg is initially 256 bits, but we truncate
⃝, if it holds and verification of the generated session
on line 10
it to 128 bits. Likewise, the initialization vector (IVg∗ ) is
key is successful. Finally, the SDi computes the parameters
derived by inverting the bits of Kg∗ , and the associative data ∗
{CTrn , M Cr1 } using the AEGIS encryption algorithm. Here
ADg∗ is set to be equal to Kg∗ . In addition, GSj checks
initialization vector (IV2n ) is obtained after the inverting bits
the condition on line 20 ⃝ to ensure the integrity of PDk and
∗ of QT2∗ and associative data AD2n = Q2 . SDi replaces {CTrn ,
M CD . If this condition holds, GSj computes parameter E1n , n ∗
k M Cr1 } with {CTr , M Cr1 } in its own memory.
and plaintext P3 . Here, the size of Kg is initially 256 bits,
but we truncate it to 128 bits. Likewise, the initialization
vector (IVg∗ ) is derived by inverting the bits of Kg∗ , and the E. Password and Bio-metric Update Phase
associative data ADg∗ is set to be equal to Kg∗ . Furthermore,
by using the AEGIS encryption algorithm, GSj computes CT This phase of the proposed PAF-IoD enables Ui to update or
and M Crn , where CT = {Qnr1 , Qnr2 }. Here, the initialization change its bio-metrics and password without involving GSj .Ui
vector (IV4 ) is derived by inverting the bits of βK . Finally, can change its password by executing the algorithm 5. In
GSj computes Z1 , Z2 , Z3 , Z4 , and Z5 and constructs a algorithm 5, the biometric and password update procedure
message with parameters {T2 , Q6 , Q7 , Q8 , Q9 , Q10 , M C3 } starts after taking the input parameters, such as {IDUi , P WUoi ,
and send it to Dk via an open communication channel. BiooUi , RAo1 , M C1o , M Cr1
o
, D2o , CTro , RP o , P WUni , BionUi ,
3) Step ALG-3: In this step, the algorithm 3 is executed by RA1 }, where P WUi , BioUi , and RAn1 are the newly selected
n n n
Dk . The procedure “verification and generation of message parameters and other are the old parameters stored in the
M G3 ” (VGM) starts after taking the parameters {T2 , Q6 , memory of the SDi of Ui . The algorithm 5 generates the new
Q7 , Q8 , Q9 , Q10 , M C3 , RP } as input and generates the parameters, such as {CTrn , D2n , RP n , RAn1 , M C1n , M Cr1 n
,
massage M G3 with parameters {T3 , Q11 , Q12 , Q13 , Q14 , Q15 , Gen(.), Rep(.)} and replaces them with {CTr , D2 , RP o ,
o o
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
Algorithm 5 Bio-metric and Password Update or delayed massage. Thus, PAF-IoD is resistant to the relay
o
Input: {IDUi , P WU , Bioo o o o o o
Ui , RA1 , M C1 , M Cr1 , D2 , CTr , RP , P WUi ,
o n
attack.
i
BionUi , RA n
1 }
Output: {CTrn , D2n , RP n , RAn n n 3) DoS Attack: In the PAF-IoD scheme, it is crucial for Ui
1 , M C1 , M Cr1 , Gen(.), Rep(.)}
1: procedure BPU({IDUi , P WUoi , BiooUi , RAo1 , M C1o , M Cr1 o
, D2o , CTro , to successfully complete local authentication before sending
RP o , P WU n
, Bion n
Ui , RA1 }),
i the authentication request to GSj . To achieve local authenti-
2: (β o ) ← Rep(Bioo Ui , RP ),
3: K1o ← H(β o ∥ IDUi ∥ P WU o
), cation, the SDi of Ui verifies certain conditions, specifically
i
4: Plo ← {β o , IDUi , P WU o
i
}, M C1 ==M C1∗ and M Cr1 ==M Cr1 ∗
. If any of these conditions
5: AD1o ← (β o ⊕ RAo 1 ),
6: D1o ← (β o ⊕ K1o ),
fail to hold, the SDi of Ui terminates the authentication
7: ((Q1 , Q2 , Q3 ), M C1o ) ← EK o {(IV1o , AD1o ), Plo },
o o o
1
process. This approach prevents Ui from inundating GSj
8: if M C1 ==M C1o then with excessive authentication requests that could potentially
9: SIDDk ← (D2o ⊕ D1o ⊕ Qo 3 ),
10: (P1 , M Cr1 o
) ← DQo {(IV2o , AD2o ), CTro }, overwhelm its resources. As a result, the proposed PAF-
o 2
11: if M Cr1 ==M Cr1 then IoD scheme exhibits resistance against denial-of-service (DoS)
12: P1 = {Qr1 , Qr2 , M Cr , GIDGSj },
13: (β n , RP n ) ← Gen(Bion
attacks.
Ui ),
14: K1o ← H(β n ∥ IDU n
∥ P WU n
), 4) MITM Attack: As per the threat model outlined in
n n i n i
15: Pl ← {β , IDUi , P WU },
i Section IV-B, the adversary A is capable of capturing the
16: AD1n ← (β n ⊕ RAn 1 ),
17: D1n ← (β n ⊕ K1n ),
message M G1 :{T1 , Qr1 , Qr2 , Q4 , Q5 , M Cr , M C2 } through
18: ((Qn n n n
1 , Q2 , Q3 ), M C1 ) ← EK1
n n n
n {(IV1 , AD1 ), Pl }, an eavesdropping attack. Subsequently, A aims to establish a
19: D2n ← SIDDk ⊕ D1n ⊕ Qn 3, session key with Dk with the assistance of GSj . To accomplish
20: (CTrn , M Cr1 n
) ← EQn {(IV2n , AD2n ), P1 },
21: else
2
this, A modifies the contents of the captured messages and
22: Execution terminated re-transmits the modified message to GSj . Upon receiving the
23: end if
24: else modified message, GSj verifies the integrity and authenticity
25: Execution terminated of the message by checking the conditions M Cr ==M Cr and
26: end if
27: end procedure M C3 ==M C2 . If any of these conditions fail, GSj rejects the
message and terminates the authentication process. Similar
integrity and authenticity checks are performed on M G2 and
A. Informal Security Analysis M G3 using the conditions M C3 ==M C3 and M C5 ==M C5∗ ,
respectively. The conditions M Cr ==M Cr∗ and M C3 ==M C2 ,
The non-mathematical approach to security evaluation is M C3 ==M C3∗ , M C5 ==M C5∗ will not hold for the modified
referred to as informal security analysis. We elucidate the version of the messages M G1 , M G2 and M G3 , respectively.
PAF-IoD’s immunity against various weaknesses in security In this way, the proposed PAF-IoD can resist MITM attack.
in informal security assessment. 5) Impersonation Attack: According to the threat/attack
1) Anonymous/Untraceable Communication: In PAF-IoD, model discussed in Section IV-B, A can capture the all the
M G1 :{T1 , Qr1 , Qr2 , Q4 , Q5 , M Cr , M C2 }, M G2 :{T2 , communicated messages. To impersonate as Ui , A requires
Q6 , Q7 , Q8 , Q9 , Q10 , M C3 }, and M G3 :{T3 , Q11 , Q12 , to construct the message M G1 :{T1 , Qr1 , Qr2 , Q4 , Q5 ,
Q13 , Q14 , Q15 , M C4 } are communicated to accomplish the M Cr , M C2 }. For constructing a valid M G1 , A require
LKA phase. All the messages are incorporated with the latest knowing the parameters Q∗1 and IDUi . The parameters Q∗1
time stamps and fresh random numbers. All the parameters of and IDUi used in the encryption process, which generates
M G1 , M G2 , and M G3 are dynamic, and A cannot determine the components {Qr2 , Q4 , Q5 , M C2 } of the message M G1 .
any correlation between the captured message from two differ- In addition, A also requires to know the secret key Kg ,
ent authentication sessions. In addition, it is not possible for to get the parameters Q∗1 and IDUi from Qr1 and Qr2 .
A to obtain the real identity or other credentials from M G1 , However, parameters {Q∗1 , IDUi } and Kg are known only to
M G2 , and M G3 for tracking the user. In this way, PAF-IoD Ui and GSj . Thus, A cannot generate a valid M G1 without
can achieve anonymous ad untraceable communication in the knowing Q∗1 , IDUi , and Kg . Therefore, PAF-IoD is resistant to
IoD environment. user impersonation attacks. Moreover, A cannot construct the
2) Replay Attack: In the LKA phase, there are three mes- messages M G2 :{T2 , Q6 , Q7 , Q8 , Q9 , Q10 , M C3 } without
sages, such as M G1 :{T1 , Qr1 , Qr2 , Q4 , Q5 , M Cr , M C2 }, knowing βk , CHDk and Kg . Here, the credentials βk and
M G2 :{T2 , Q6 , Q7 , Q8 , Q9 , Q10 , M C3 }, and M G3 :{T3 , CHDk are stored in encrypted form in the database of GSj ,
Q11 , Q12 , Q13 , Q14 , Q15 , M C4 } are disseminated by the where the encryption is performed using Kg . The parameters
IoD network participants. All the messages are incorporated βk and CHDk , and Kg are known only to GSj and Dk . Thus,
with the latest timestamps to ensure the freshness of the PAF-IoD can prevent ground station impersonation attacks.
messages. For instance, M G1 is incorporated with T1 and at Similarly, without knowing the para maters RA2 , Q1 , SIDDk ,
GSj the freshness of M G1 is verified through the condition and IDUi , A is unable to generate a valid M G3 :{T3 , Q11 ,
Td ≤ |Tr −T1 |. If the value of the Td is within the allowed time Q12 , Q13 , Q14 , Q15 , M C4 }. In this way, the proposed PAF-
delay threshold, then M G1 is contemplated as a licit message. IoD is resilient against the drone impersonation attack.
Otherwise, M G1 is contemplated as delayed or invalid, and 6) ESL Attack: The session key SKDk (= SKUi ), essential
all the replayed or delayed messages are dropped by the for achieving encrypted communication in the proposed PAF-
receiving network entity. The same is the case with M G2 and IoD scheme, is derived as SKDk (= SKUi ) = H(Z1 ∥ P4 ∥
M G3 . In this way, the proposed PAF-IoD detects the replayed T3 ∥ AD6 ), where Z1 = ZZ1 , where Z1 corresponds to ZZ1
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
10
generated during the LKA phase. This session key combines Freshness: A is unable to disclose the session key established
various long and short-term secret parameters. The long-term betweenϕIU1i and ϕID3k during the LKA phase.
confidential credentials of the entity participating part in the Adversary:The capabilities of A are outlined in Section IV-B.
authentication procedure would still need to be obtained even Furthermore, A executes simulations of various queries to
if A is able to breach the short-term confidential credentials. carry out different attacks on PAF-IoD.
Consequently, A should concurrently hold both the long-term
Theorem 1. Let A be a polynomial-time plt adversary that is
confidential credentials and the short-term confidential creden-
executing against PAF-IoD. The advantage of A in breaching
tials to be able to undermine the security of the session key
the security of PAF-IoD’s session key can be calculated as
created through the authentication procedure. The suggested
follows:
PAF-IoD technique is still resistant to the ESL attack without 2
access to these confidential credentials. AF −IoD Hq2 Hpuf Sq
Adv P
A (plt) ≤ + + bkl−1
7) Physical Capture Attack: A has the capability to capture 2|HoL| 2|P U F | 2 · |P L|
a drone Dk , which is deployed in the IoD environment. Dk is OCCA3
+2 · Adv AEAD,A (plt)
a tamper-proof device and A after capturing A tries to arm (2)
it. As the proposed PAF-IoD is designed using PUF, which In the given context, the terms Hq2 , Sq , |P L|, and 2bkl ,
changes its behavior when A attempts to harm the device. |HoL| represent the hash function, send queries, password
Any harm to the tamper-proof Dk leads to the generation of length, bio-metric key length, and the length of out of the
an incorrect response. Thus, the incorrect response will not hash function, respectively. Additionally, Adv OCCA3 (plt) [31]
A
generate the desired output during the execution of the LKA denotes the advantage of adversary A in compromising the
phase of PAF-IoD. In addition, βk and CHDk are stored in security of AEAD.
encrypted form at GSj . Thus, after capturing Dk , A cannot
compromise the session key and effectuate any well-known Proof. The proof of Theorem 1 is illustrated through a series
attack. Therefore, the proposed PAF-IoD is resistant to drone of five consecutive games (Gz |z = 0, 1, 2, 3, 4) [33]. Addi-
physical capture attacks. tionally, the notation ”Adv G ” represents the probability of
8) Bio-metric and Password Change Attack: By leveraging adversary A winning by correctly guessing the true value of
power analysis attacks, A can acquire the following creden- bit ”b” in each game Gt .
tials CTr , D2 , RP , RA1 , M C1 , M Cr1 , Gen(.), Rep(.)} after G0 : In this game, which corresponds to the real attack
capturing the SDi of Ui . The objective of A in this attack is to scenario, all Oracle queries are responded to truthfully in
modify or update the password and biometric information of compliance with the specifications of the protocol. Based on
Ui . To accomplish this, A randomly selects sensitive param- the security definition, we have the following:
eters BioA A A
Ui , IDUi and P WUi , and performs the following Adv P AF −IoD
(plt) = |2 · Adv G0 − 1|. (3)
A
computations: β = Rep(BioA
A
Ui , RP ), K1
A
= H(β A ∥
A G1 : In this game, A is allowed to capture messages,
IDU i
∥ P WUAi ), PlA = {β A , IDU
A
i
, P WUAi }, AD1A = (β A ⊕ namely M G1 :{T1 , Qr1 , Qr2 , Q4 , Q5 , M Cr , M C2 },
RA1 ), D1A = (β A ⊕ K1A ), and ((QA A A A
1 , Q2 , Q3 ), M1 ) = M G2 :{T2 , Q6 , Q7 , Q8 , Q9 , Q10 , M C3 }, and M G3 :{T3 ,
EK1A (IV1A , AD1A ), PlA }. Finally, A needs to verify the con- Q11 , Q12 , Q13 , Q14 , Q15 , M C4 } through an eavesdropping
dition M C1 == M C1A . However, without knowledge of the attack, accomplished by the Execute(ϕIU1i , ϕIGS
2
, ϕID3k ) query.
j
secret and valid credentials of Ui , this condition cannot be After capturing the messages, A aims to deduce a valid
satisfied. Additionally, during the LKA phase, the biometric session key SKDk (= SKUi ) == H(Z1 ∥ P4 ∥ T3 ∥ AD6 ),
key is utilized, which is challenging to generate and guess. which is a combination of temporary credentials (RNa , RNb ,
Given these constraints, it becomes difficult for A to ensure RNd , CTmg2 ) and long-term credentials (A1 , SIDi , DSK,
the condition M C1 == M C1A . Therefore, the proposed PAF- GK). At the end of G1, A performs Reveal(ϕI1 ) to dis-
IoD offers resistance against biometric and password update close the speculated session key and subsequently uses the
attacks. T est(ϕI1 ) query to assess the difference between the actual
session key and an arbitrary bit. Since A lacks both the long-
B. Security Analysis Using Random-or-Real Model term and short-term parameters, it is unable to construct a
The Real-or-Random model [9] functions as a formal proof valid session key. Consequently, the likelihood of A winning
analysis, confirming the protocol’s session key security. This is minimal. Thus, G0 and G1 are indistinguishable. Therefore,
lays the foundations for implementing the PAF-IoD into the we have the following:
ROR model. Participants, adversaries, and queries all exist in Adv G1 = Adv G0 (4)
the framework of our scheme. G2 : In this game, an active attack is initiated by A through
Participants: Participants refer to the entities involved in the the use of hash (HoL) queries. In the context of PAF-IoD,
communication within the proposed PAF-IoD. There are three the session key is derived using the SHA algorithm on the
primary participants in PAF-IoD, namely Uj , GSj , and Dk . side of Ui and SDi . A aims to find a collision by making
We represent the instances I1 , I2 , and I3 of Uj , GSj , and Dk HoL queries in order to compromise the security of the SK.
as ϕIU1i , ϕGS
I2
j
, and ϕI3
Dk , respectively, which act as oracles. However, the probability of successfully detecting a collision
Partnership: In the acceptance state, the instances ϕIU1i and is extremely low. In addition, A in this game also employs
ϕID3k become partners if they possess a shared session key. queries Send and P U F . As stated in Section III-B, cloning the
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
11
Table III
ROR MODEL Q UERIES
Query Description
Execute(ϕIU1 , ϕIGS
2
, ϕID3 ) This query simulates a passive attack. This query gives A access to all of the messages delivered during the PAF-IoD’s secure channel setup process.
i j k
Test(ϕI1 ) To determine if the speculative session key is a real session key or a random result, A runs this query.
Reveal(ϕI1 ) The session key sustained by oracle ϕI1 is made available to A by using this query.
Send(ϕI1 , M G) This query launches an active attack. Furthermore, ϕI1 is able to send M G as a message to ϕp2 and receive an answer in return.
CorruptSD(ϕI1 ) This query is used by A to get the long-term credentials stored in the memory of SDi .
PUF is highly challenging or even impossible. Consequently, By using (8) and (10), we obtain
the A’ advantage does not increase in G2. Thus, we have 1 AF −IoD
.Adv P
A (plt) = |Adv G1 − Adv G4 | (11)
2
2
Hq2 Hpuf Upon considering the triangular inequality, we have
Adv G2 − Adv G1 ≤ + . (5)
2|HoL| 2|P U F |
|Adv G1 − Adv G4 | ≤ |Adv G1 − Adv G2 |
G3 : In this game, A initiates an active attack using the +|Adv G2 − Adv G4 |
CorruptSD(ϕI1 ) query. By seizing the SCR, the attacker can (12)
obtain the credentials {CTr , D2 , RP , RA1 , M C1 , M Cr1 , ≤ |Adv G1 − Adv G2 | + |Adv G2 − Adv G3 |
Gen(.), Rep(.)} stored in the memory of the SCR. A attempts +|Adv G3 − Adv G4 |.
to guess the identity, password, and biometric key of Uj . By using (5), (7), and (12), we get
However, the probability of correctly guessing the biometric Hq2 2
Hpuf Sq
AF −IoD
1
key is 2bkl , which is negligible. Furthermore, it is important Adv P
A (plt) ≤ + + bkl−1
|HoL| |P U F | 2 · |P L|
to note that only a restricted number of incorrect password
attempts are permitted. With these probabilities in mind, we +2.Adv OCCA3
AEAD,A (plt).
can draw the following conclusions. (13)
Sq ■
Adv G3 − Adv G2 ≤ bkl . (6)
2 · |P L|
G4 : In this game, an active attack is carried out using C. Scyther Based Security Analysis
Execute(ϕIU1i , ϕIGS2
j
, ϕID3k ). By enabling this query, an adver- There are various automated tools available for validating
sary A can capture all the communicated messages, denoted the resilience of the proposed security framework against
as M G1 :{T1 , Qr1 , Qr2 , Q4 , Q5 , M Cr , M C2 }, M G2 :{T2 , different attacks. Two commonly used software tools for
Q6 , Q7 , Q8 , Q9 , Q10 , M C3 }, and M G3 :{T3 , Q11 , Q12 , Q13 , ensuring the security properties of the proposed protocol are
Q14 , Q15 , M C4 }. The primary objective of A is to obtain AVISPA and Scyther. In our case, we have chosen to utilize
all the secret parameters utilized in the construction of the Scyther to guarantee the resilience of PAF-IoD against a wide
session key. However, in the proposed PAF-IoD framework, range of attacks. Our preference for Scyther is due to several
all communicated messages are encrypted using the AEGIS reasons. Firstly, Scyther provides a graphical representation
encryption algorithm. It is important to note that AEGIS is when it detects attacks against the proposed security frame-
considered secure and the advantage an adversary A has work, whereas AVISPA does not generate attack graphs. This
in compromising the security (confidentiality and integrity) visual representation enhances the understanding of attack
of AEGIS in polynomial time is negligible (as defined in scenarios. Secondly, Scyther has the capability to validate
Definition 1). Thus, in order to compromise the security of multi-protocol attacks, whereas AVISPA does not provide
the proposed PAF-IoD, A would need to breach the security verification for such attacks. This is particularly important for
of the AEGIS encryption algorithm. Based on the definition assessing the robustness of the security framework in real-
provided in Definition 1, we can conclude the following: world scenarios involving multiple protocols. Additionally,
Adv G4 − Adv G3 ≤ Adv OCCA3
AEAD,A (plt). (7) Scyther allows for the verification of the proposed security
After completing all (Gz |z ∈ [0, 3]), the adversary A does framework using both bounded and unbounded numbers of
not gain any significant advantage in acquiring the accurate sessions, providing flexibility in analyzing different scenarios.
bit “b”. Therefore, we can conclude that On the other hand, AVISPA only supports verification through
a bounded number of sessions. Lastly, it is worth mentioning
that “AVISPA” employs the “High-level protocol specifica-
Adv G4 = 1/2 (8) tion language (HLPSL)”, while Scyther utilizes the “Security
protocol description language (SPDL)” for implementing the
From (3) and (4), we get
proposed security framework. The choice of Scyther aligns
AF −IoD 1
Adv P
A (plt) = |2 · Adv G0 − |. (9) with our implementation requirements and allows for effective
2 analysis and validation of the security framework.
From (9), we get
1 Scyther is a powerful automated tool used for validating,
AF −IoD
.Adv P
A (plt) = |Adv G0 − Adv G4 |. (10) verifying, and analyzing security frameworks and techniques.
2
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
12
Table IV
PARAMETER S IZE AND C OMPUTATIONAL T IME
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
13
Table V
S ECURITY F EATURES
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
14
Figure 8. Computational overhead GSj with the increase of authentication Figure 10. Comparison of bandwidth requirement for accomplishing the LKA
requests. phase with the increase in users.
IX. ACKNOWLEDGMENT
This study is supported via funding from Prince Sattam bin
Abdulaziz University project number (PSAU/2024/R/1445)
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Vehicular Technology. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TVT.2024.3365992
15
[12] M. Wazid, A. K. Das, N. Kumar, A. V. Vasilakos, and J. J. P. C. grids applications,” Journal of Information Security and Applications,
Rodrigues, “Design and analysis of secure lightweight remote user vol. 71, p. 103336, 2022.
authentication and key agreement scheme in Internet of Drones deploy- [33] S. A. Chaudhry, A. Irshad, M. A. Khan, S. A. Khan, S. Nosheen,
ment,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3572–3584, A. A. AlZubi, and Y. B. Zikria, “A lightweight authentication scheme
2019. for 6G-IoT enabled maritime transport system,” IEEE Transactions on
[13] M. Nikooghadam, H. Amintoosi, S. H. Islam, and M. F. Moghadam, Intelligent Transportation Systems, vol. 24, no. 2, pp. 2401–2410, 2023.
“A provably secure and lightweight authentication scheme for Internet [34] A. Irshad, G. A. Mallah, M. Bilal, S. A. Chaudhry, M. Shafiq, and
of Drones for smart city surveillance,” Journal of Systems Architecture, H. Song, “SUSIC: A secure user access control mechanism for SDN-
vol. 115, p. 101955, 2021. enabled IIoT and cyber physical systems,” IEEE Internet of Things
[14] Y. Kirsal Ever, “A secure authentication scheme framework for Journal, pp. 1–1, 2023.
mobile-sinks used in the Internet of Drones applications,” Computer [35] J. Srinivas, A. K. Das, M. Wazid, and A. V. Vasilakos, “Designing
Communications, vol. 155, pp. 143–149, 2020. [Online]. Available: secure user authentication protocol for big data collection in IoT-based
https://www.sciencedirect.com/science/article/pii/S014036641930790X intelligent transportation system,” IEEE Internet of Things Journal,
[15] M. Tanveer, A. U. Khan, N. Kumar, and M. M. Hassan, “RAMP-IoD: vol. 8, no. 9, pp. 7727–7744, 2020.
A robust authenticated key management protocol for the Internet of [36] B. A. Alzahrani, A. Barnawi, and S. A. Chaudhry, “A resource-friendly
Drones,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1339–1353, authentication protocol for UAV-based massive crowd management
2022. systems,” Security and Communication Networks, vol. 2021, pp. 1–12,
[16] R. Amin, S. Jayaswal, V. Sureshkumar, B. Rathore, A. Jha, and 2021.
M. Abdussami, “IoDseC++: authenticated key exchange protocol for [37] V. Sureshkumar, R. Amin, V. Vijaykumar, and S. R. Sekar, “Robust
cloud-enable internet of drone communication,” Journal of Ambient secure communication protocol for smart healthcare system with fpga
Intelligence and Humanized Computing, pp. 1–14, 2023. implementation,” Future Generation Computer Systems, vol. 100, pp.
[17] M. Tanveer, A. Alkhayyat, A. U. Khan, N. Kumar, and A. G. Alharbi, 938–951, 2019.
“REAP-IIoT: Resource-efficient authentication protocol for the indus- [38] H. Wu and B. Preneel, “AEGIS: A fast authenticated encryption al-
trial Internet of Things,” IEEE Internet of Things Journal, vol. 9, no. 23, gorithm,” in Selected Areas in Cryptography–SAC 2013: 20th Interna-
pp. 24 453–24 465, 2022. tional Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised
[18] Y. Zhang, D. He, L. Li, and B. Chen, “A lightweight authentication and Selected Papers 20. Springer, 2014, pp. 185–201.
key agreement scheme for Internet of Drones,” Computer Communica- [39] M. Tanveer, A. Badshah, H. Alasmary, S. A. Chaudhry et al., “Cmaf-
tions, vol. 154, pp. 455–464, 2020. iiot: Chaotic map-based authentication framework for industrial internet
[19] S. Hussain, M. Farooq, B. A. Alzahrani, A. Albeshri, K. Alsubhi, and of things,” Internet of Things, vol. 23, p. 100902, 2023.
S. A. Chaudhry, “An efficient and reliable user access protocol for [40] M. Tanveer, H. Alasmary, N. Kumar, and A. Nayak, “Saaf-iod: Secure
Internet of Drones,” IEEE Access, pp. 1–1, 2023. and anonymous authentication framework for the internet of drones,”
[20] M. Tanveer, G. Abbas, Z. H. Abbas, M. Bilal, A. Mukherjee, and K. S. IEEE Transactions on Vehicular Technology, 2023.
Kwak, “LAKE-6SH: Lightweight user authenticated key exchange for [41] T. Alladi, N. Naren, G. Bansal, V. Chamola, and M. Guizani, “Se-
6LoWPAN-based smart homes,” IEEE Internet of Things Journal, vol. 9, cAuthUAV: A novel authentication scheme for UAV-ground station and
no. 4, pp. 2578–2591, 2022. UAV-UAV communication,” IEEE Transactions on Vehicular Technol-
ogy, vol. PP, 10 2020.
[21] S. Hussain, S. A. Chaudhry, O. A. Alomari, M. H. Alsharif, M. K. Khan,
and N. Kumar, “Amassing the security: An ECC-based authentication
scheme for Internet of Drones,” IEEE Systems Journal, vol. 15, no. 3,
pp. 4431–4438, 2021.
[22] T. Wu, X. Guo, Y. Chen, S. Kumari, and C. Chen, “Amassing the
security: An enhanced authentication protocol for drone communications
over 5G networks,” Drones, vol. 6, no. 1, p. 10, 2022.
[23] M. Zhang, C. Xu, S. Li, and C. Jiang, “On the security of an ECC-based
authentication scheme for Internet of Drones,” IEEE Systems Journal,
vol. 16, no. 4, pp. 6425–6428, 2022.
[24] S. Yu, A. K. Das, Y. Park, and P. Lorenz, “SLAP-IoD: Secure and
lightweight authentication protocol using physical unclonable functions
for Internet of Drones in smart city environments,” IEEE Transactions
on Vehicular Technology, vol. 71, no. 10, pp. 10 374–10 388, 2022.
[25] M. Tanveer, H. Shah, S. A. Chaudhry, A. Naushad et al., “PASKE-
IoD: Privacy-protecting authenticated key establishment for Internet of
Drones,” IEEE Access, vol. 9, pp. 145 683–145 698, 2021.
[26] C. Pu, A. Wall, K.-K. R. Choo, I. Ahmed, and S. Lim, “A lightweight and
privacy-preserving mutual authentication and key agreement protocol for
Internet of Drones environment,” IEEE Internet of Things Journal, vol. 9,
no. 12, pp. 9918–9933, 2022.
[27] K. Lounis, S. H. H. Ding, and M. Zulkernine, “D2D-MAP: A drone
to drone authentication protocol using physical unclonable functions,”
IEEE Transactions on Vehicular Technology, vol. 72, no. 4, pp. 5079–
5093, 2023.
[28] M. A. Khan, H. Shah, S. U. Rehman, N. Kumar, R. Ghazali, D. Shehzad,
and I. Ullah, “Securing Internet of Drones with identity-based proxy
signcryption,” IEEE Access, vol. 9, pp. 89 133–89 142, 2021.
[29] P. Gope and B. Sikdar, “An efficient privacy-preserving authenticated
key agreement scheme for edge-assisted Internet of Drones,” IEEE
Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13 621–
13 630, 2020.
[30] R. Karmakar, G. Kaddoum, and O. Akhrif, “A PUF and fuzzy extractor-
based UAV-ground station and UAV-UAV authentication mechanism
with intelligent adaptation of secure sessions,” IEEE Transactions on
Mobile Computing, pp. 1–18, 2023.
[31] F. Abed, C. Forler, and S. Lucks, “General classification of the authen-
ticated encryption schemes for the CAESAR competition,” Computer
Science Review, vol. 22, pp. 13–26, 2016.
[32] M. Tanveer, M. Ahmad, H. S. Khalifa, A. Alkhayyat, and A. A. Abd
El-Latif, “A new anonymous authentication framework for secure smart
Authorized licensed use limited to: National Sun Yat Sen Univ.. Downloaded on March 02,2024 at 05:16:12 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.