Loading…

D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain

Tactile Internet, a fast and low-latency communication network, plays a crucial role in IoD applications for providing various features like precision control and realistic telepresence. The Internet of Drones (IoD) is a rapidly evolving concept that envisions a network of collaborating and communic...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on consumer electronics 2024-02, Vol.70 (1), p.4239-4248
Main Authors: Dwivedi, Sanjeev Kumar, Abdussami, Mohammad, Amin, Ruhul, Khan, Muhammad Khurram
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Tactile Internet, a fast and low-latency communication network, plays a crucial role in IoD applications for providing various features like precision control and realistic telepresence. The Internet of Drones (IoD) is a rapidly evolving concept that envisions a network of collaborating and communicating interconnected drones. Drones have diverse applications, including traffic monitoring, medicine, battlefield surveillance, logistics, and agriculture. However, the widespread deployment of drones raises significant security and privacy concerns. In this paper we have proposed secure data delivery authentication protocol for tactile Internet enabled IoD system (\text {D}^{3} APTS). Also, using blockchain along with IoD for storing data will provide additional characteristics like data immutability. To secure communication among user, ground station server, and drone D3APTS employs one-way hash function and ECC cryptosystem. It resists various attacks like impersonation attacks, capturing attacks, session-key disclosure attacks, especially desynchronisation attacks which is important in case of IoD scenario. D3APTS also provides anonymity and unlinkability features. It is formally verified using the scyther security tool and ROR model. The performance analysis and comparison shows that D3APTS is better in terms of computation, communication overheads, security and functionality features.
ISSN:0098-3063
1558-4127
DOI:10.1109/TCE.2023.3345893