Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.1.11

Analysis of Security Vulnerability in U2U Authentication Using MEC in IoD Environment  

Choi, Jae Hyun (Korea University)
Lee, Sang Hoon (Korea University)
Jeong, Ik Rae (Samsung SDS)
Byun, Jin Wook (Pyeongtaek University)
Abstract
Due to the recent development of the Internet of Things (IoT) and the increase in services using drones, research on IoD is actively underway. Drones have limited computational power and storage size, and when communicating between drones, data is exchanged after proper authentication between entities. Drones must be secure from traceability because they contain sensitive information such as location and travel path. In this paper, we point out a fatal security vulnerability that can be caused by the use of pseudonyms and certificates in existing IoD research and propose a solution.
Keywords
Internet of Drone; MEC; Authentication; Pseudonym;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Tomic, K. Schmid, P. Lutz, A. Domel, M. Kassecker, E. Mair, I.L. Grixa, F. Ruess, M. Suppa and D. Burschka," Toward a fully autonomous UAV: research platform for indoor and outdoor urban search and rescue," IEEE robotics & automation magazine, vol. 19, no. 3, pp. 46-56, Sep. 2012.   DOI
2 L. Merino, F. Caballero, J.R. Martinez-de-Dios, I. Maza and A.Ollero, "An unmanned aircraft system for automatic forest fire monitoring and measurement," Journal of Intelligent & Robotic Systems, vol. 65, no. 1, pp. 533-548, Aug. 2011.   DOI
3 Y. Tien, J. Yuan and H. Song, "Efficient privacy-preserving authentication framework for edge-assisted internet of drones," Journal of Information Security and Applications, vol. 48, Oct. 2019.
4 Y.C. Hu, M. Patel, D. Sabella, N. Sprecher and V. Young, "Mobile edge computing-a key technology towards 5G," ETSI white paper, pp. 1-16, Sep. 2015.
5 A.C.C. Yao and Y. Zhao, "Online/offline signatures for low-power devices," IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 283-294, Feb. 2012.   DOI
6 S. Even, O. Goldreich and S. Micali, "On-line/off-line digital signatures," Journal of Cryptology, vol. 9, no. 1, pp. 35-67, Mar. 1996.   DOI