{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:43:06Z","timestamp":1777502586329,"version":"3.51.4"},"reference-count":35,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T00:00:00Z","timestamp":1675987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002509","name":"Keimyung University","doi-asserted-by":"publisher","award":["2019"],"award-info":[{"award-number":["2019"]}],"id":[{"id":"10.13039\/501100002509","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted from stolen mobile devices of remote users. Moreover, drones are susceptible to physical capture and manipulation by adversaries, which are called drone capture attacks. Thus, the development of a secure and lightweight authentication scheme is essential to overcoming these security vulnerabilities, even on resource-constrained drones. In 2021, Akram et al. proposed a secure and lightweight user\u2013drone authentication scheme for drone networks. However, we discovered that Akram et al.\u2019s scheme is susceptible to user and drone impersonation, verification table leakage, and denial of service (DoS) attacks. Furthermore, their scheme cannot provide perfect forward secrecy. To overcome the aforementioned security vulnerabilities, we propose a secure mutual authentication and key agreement scheme between user and drone pairs. The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. Moreover, the proposed scheme uses a fuzzy extractor to utilize the biometrics of users as secret parameters. We analyze the security of the proposed scheme using informal security analysis, Burrows\u2013Abadi\u2013Needham (BAN) logic, a Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. We also compared the security features and performance of the proposed scheme and the existing related schemes. Therefore, we demonstrate that the proposed scheme is suitable for IoD environments that can provide users with secure and convenient wireless communications.<\/jats:p>","DOI":"10.3390\/s23042034","type":"journal-article","created":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T02:14:11Z","timestamp":1676254451000},"page":"2034","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9011-8410","authenticated-orcid":false,"given":"Yohan","family":"Park","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Keimyung University, Daegu 42601, Republic of Korea"}]},{"given":"Daeun","family":"Ryu","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Keimyung University, Daegu 42601, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0014-1965","authenticated-orcid":false,"given":"Deokkyu","family":"Kwon","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, Daegu 41566, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0406-6547","authenticated-orcid":false,"given":"Youngho","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, Daegu 41566, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/ACCESS.2016.2537208","article-title":"Internet of drones","volume":"4","author":"Gharibi","year":"2016","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"25532","DOI":"10.1109\/JSEN.2021.3114266","article-title":"Applications, deployments, and integration of internet of drones (iod): A review","volume":"21","author":"Abualigah","year":"2021","journal-title":"IEEE Sens. J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","article-title":"Security and privacy for the internet of drones: Challenges and solutions","volume":"56","author":"Lin","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"19634","DOI":"10.1109\/TITS.2021.3129913","article-title":"A secure and lightweight drones-access protocol for smart city surveillance","volume":"23","author":"Akram","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"12158","DOI":"10.1109\/TVT.2021.3118892","article-title":"Provable secure identity-based anonymous and privacy-preserving inter-vehicular authentication protocol for VANETS using PUF","volume":"70","author":"Umar","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical unclonable functions and applications: A tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_7","unstructured":"AVISPA, T. (2023, February 06). Automated Validation of Internet Security Protocols and Applications. Available online: https:\/\/www.avispa-project.org\/."},{"key":"ref_8","unstructured":"Glouche, Y., Genet, T., Heen, O., and Courtay, O. (2006, January 18\u201320). A security protocol animator tool for AVISPA. Proceedings of the ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa, Italy."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Fouque, P.A., and Pointcheval, D. (2005, January 23\u201326). Password-based authenticated key exchange in the three-party setting. Proceedings of the International Workshop on Public Key Cryptography, Les Diablerets, Switzerland.","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3572","DOI":"10.1109\/JIOT.2018.2888821","article-title":"Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of drones deployment","volume":"6","author":"Wazid","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Teng, L., Jianfeng, M., Pengbin, F., Yue, M., Xindi, M., Jiawei, Z., Gao, C., and Di, L. (2019, January 10\u201313). Lightweight security authentication mechanism towards UAV networks. Proceedings of the 2019 International Conference on Networking and Network Applications (NaNA), Daegu City, Republic of Korea.","DOI":"10.1109\/NaNA.2019.00072"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6903","DOI":"10.1109\/TVT.2019.2911672","article-title":"TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment","volume":"68","author":"Srinivas","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"43711","DOI":"10.1109\/ACCESS.2020.2977817","article-title":"Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.comcom.2020.03.009","article-title":"A secure authentication scheme framework for mobile-sinks used in the internet of drones applications","volume":"155","author":"Ever","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.comcom.2020.08.016","article-title":"A smart lightweight privacy preservation scheme for IoT-based UAV communication systems","volume":"162","author":"Deebak","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"10","DOI":"10.3390\/drones6010010","article-title":"Amassing the security: An enhanced authentication protocol for drone communications over 5G networks","volume":"6","author":"Wu","year":"2022","journal-title":"Drones"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"19836","DOI":"10.1109\/ACCESS.2022.3149376","article-title":"RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones","volume":"10","author":"Tanveer","year":"2022","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.comcom.2020.05.025","article-title":"PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks","volume":"160","author":"Alladi","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Pu, C., and Li, Y. (2020, January 13\u201315). Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system. Proceedings of the 2020 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Orlando, FL, USA.","DOI":"10.1109\/LANMAN49260.2020.9153239"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3319","DOI":"10.1007\/s12083-021-01130-5","article-title":"An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones","volume":"14","author":"Zhang","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1542","DOI":"10.1109\/JIOT.2021.3088115","article-title":"Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain","volume":"9","author":"Chattaraj","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1109\/JIOT.2021.3084946","article-title":"RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones","volume":"9","author":"Tanveer","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., and Smith, A. (2004, January 2\u20136). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"54796","DOI":"10.1109\/ACCESS.2021.3071499","article-title":"Design of secure decentralized car-sharing system using blockchain","volume":"9","author":"Kim","year":"2021","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kwon, D.K., Yu, S.J., Lee, J.Y., Son, S.H., and Park, Y.H. (2021). WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors, 21.","DOI":"10.3390\/s21030936"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"12879","DOI":"10.1109\/ACCESS.2021.3050402","article-title":"On the design of lightweight and secure mutual authentication system for global roaming in resource-limited mobility networks","volume":"9","author":"Shashidhara","year":"2021","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","article-title":"Zipf\u2019s law in passwords","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TVT.2021.3050614","article-title":"On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system","volume":"70","author":"Bagga","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","article-title":"Design of blockchain-based lightweight V2I handover authentication protocol for VANET","volume":"9","author":"Son","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"8804","DOI":"10.1109\/JIOT.2019.2923611","article-title":"AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment","volume":"6","author":"Wazid","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Boyko, V., MacKenzie, P., and Patel, S. (2000, January 14\u201318). Provably secure password-authenticated key exchange using Diffie-Hellman. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium.","DOI":"10.1007\/3-540-45539-6_12"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"42529","DOI":"10.1109\/ACCESS.2022.3168843","article-title":"Design of Secure Handover Authentication Scheme for Urban Air Mobility Environments","volume":"10","author":"Kwon","year":"2022","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"11511","DOI":"10.1109\/ACCESS.2022.3145959","article-title":"Secure ECC-based three-factor mutual authentication protocol for telecare medical information system","volume":"10","author":"Ryu","year":"2022","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/2034\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:31:09Z","timestamp":1760121069000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/2034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,10]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23042034"],"URL":"https:\/\/doi.org\/10.3390\/s23042034","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,10]]}}}