{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T05:28:02Z","timestamp":1771565282129,"version":"3.50.1"},"reference-count":43,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T00:00:00Z","timestamp":1743811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China","award":["LHZSZ24F020002"],"award-info":[{"award-number":["LHZSZ24F020002"]}]},{"name":"Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China","award":["U21A20466"],"award-info":[{"award-number":["U21A20466"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LHZSZ24F020002"],"award-info":[{"award-number":["LHZSZ24F020002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20466"],"award-info":[{"award-number":["U21A20466"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The implementation of the Authentication and Key Agreement (AKA) protocol in the Internet of Drones (IoD) is crucial for enhancing the security and reliability of information transmission. However, almost all existing authentication protocols between drones and Ground Station (GS) may suffer from several attacks due to capture attacks. In addition, the authentication between drones requires the participation of GS, which not only increases the amount of computation and transmission but also faces challenges such as impersonation attacks, lack of privacy protection, and perfect forward security. Therefore, we propose a secure and lightweight drone-to-GS (D2G) and D2D AKA protocol with perfect forward secrecy for IoD. Our protocol integrates physical unclonable functions (PUF) symmetrically into GS and drones to protect secret information against capture attacks while ensuring that GS does not store secret information related to drones. Furthermore, the proposed protocol enables direct mutual authentication between drones in a symmetrical manner without GS involvement, improving security and efficiency, particularly in scenarios where drones must collaborate without GS connectivity. Formal security proof using the random oracle model confirms the protocol\u2019s resilience against various attacks. The performance analysis indicates that our scheme improves computational efficiency by an average of 39.44% compared to existing schemes that offer comparable security. Additionally, our approach incurs zero storage overhead during the GS authentication process. This protocol offers a secure and efficient solution for IoD, enhancing both security and scalability.<\/jats:p>","DOI":"10.3390\/sym17040556","type":"journal-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:05:56Z","timestamp":1744200356000},"page":"556","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8808-3124","authenticated-orcid":false,"given":"Qi","family":"Xie","sequence":"first","affiliation":[{"name":"Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China"}]},{"given":"Jilin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Rodrigues, M., Amaro, J., Os\u00f3rio, F.S., and RLJC, B.K. (July, January 29). Authentication methods for UAV communication. Proceedings of the 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain.","DOI":"10.1109\/ISCC47284.2019.8969732"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"90225","DOI":"10.1109\/ACCESS.2020.2992341","article-title":"A comprehensive review of the COVID-19 pandemic and the role of IoT, drones, AI, blockchain, and 5G in managing its impact","volume":"8","author":"Chamola","year":"2020","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1109\/JIOT.2018.2877504","article-title":"Transceiver design and multihop D2D for UAV IoT coverage in disasters","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/ACCESS.2016.2537208","article-title":"Internet of drones","volume":"4","author":"Gharibi","year":"2016","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MIC.2016.59","article-title":"An internet of drones","volume":"20","author":"Hall","year":"2016","journal-title":"IEEE Internet Comput."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Abdelmaboud, A. (2021). The internet of drones: Requirements, taxonomy, recent advances, and challenges of research trends. Sensors, 21.","DOI":"10.3390\/s21175718"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3572","DOI":"10.1109\/JIOT.2018.2888821","article-title":"Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment","volume":"6","author":"Wazid","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/OJCS.2022.3183003","article-title":"A review on security issues and solutions of the internet of drones","volume":"3","author":"Yang","year":"2022","journal-title":"IEEE Open J. Comput. Soc."},{"key":"ref_9","first-page":"134","article-title":"Communication security of unmanned aerial vehicles","volume":"4","author":"He","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3001836","article-title":"Security, privacy, and safety aspects of civilian drones: A survey","volume":"1","author":"Altawy","year":"2016","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"68472","DOI":"10.1109\/ACCESS.2018.2879758","article-title":"Jamming-resilient multipath routing protocol for flying ad hoc networks","volume":"6","author":"Pu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Michailidis, E.T., and Vouyioukas, D. (2022). A review on software-based and hardware-based authentication mechanisms for the internet of drones. Drones, 6.","DOI":"10.3390\/drones6020041"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Huang, Y., Mu, J., Wang, Y., and Zhao, R. (2023, January 18\u201321). A Review of Authentication Methods in Internet of Drones. Proceedings of the 2023 International Conference on Networking and Network Applications (NaNA), Qingdao, China.","DOI":"10.1109\/NaNA60121.2023.00009"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"103759","DOI":"10.1016\/j.jnca.2023.103759","article-title":"Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction","volume":"221","author":"Ashrif","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"8205","DOI":"10.1109\/JIOT.2022.3142084","article-title":"PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey","volume":"9","author":"Mall","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"61642","DOI":"10.1109\/ACCESS.2024.3393567","article-title":"A Survey on Key Agreement and Authentication Protocol for Internet of Things Application","volume":"12","author":"Hasan","year":"2024","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1007\/s11277-021-08565-2","article-title":"LAKA: Lightweight authentication and key agreement protocol for internet of things based wireless body area network","volume":"127","author":"Soni","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"9918","DOI":"10.1109\/JIOT.2022.3163367","article-title":"A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment","volume":"9","author":"Pu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"100493","DOI":"10.1016\/j.iot.2021.100493","article-title":"A secure anonymous D2D mutual authentication and key agreement protocol for IoT","volume":"18","author":"Hajian","year":"2022","journal-title":"Internet Things"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"69287","DOI":"10.1109\/ACCESS.2021.3076692","article-title":"Design and analysis of lightweight authentication protocol for securing IoD","volume":"9","author":"Jan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"24325","DOI":"10.1109\/ACCESS.2018.2819189","article-title":"Toward a secure drone system: Flying with real-time homomorphic authenticated encryption","volume":"6","author":"Cheon","year":"2018","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"6652","DOI":"10.1109\/TII.2020.2966758","article-title":"Intelligent UAV identity authentication and safety supervision based on behavior modeling and prediction","volume":"16","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"9547","DOI":"10.1109\/JIOT.2023.3324543","article-title":"Lightweight blockchain-enhanced mutual authentication protocol for UAVs","volume":"11","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"18400","DOI":"10.1109\/JIOT.2023.3280124","article-title":"\u03bcTesla-Based Authentication for Reliable and Secure Broadcast Communications in IoD Using Blockchain","volume":"10","author":"Benslimane","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"16928","DOI":"10.1109\/JIOT.2022.3142251","article-title":"Blockchain-assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles","volume":"9","author":"Tan","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1016\/j.comcom.2020.02.067","article-title":"A lightweight authentication and key agreement scheme for Internet of Drones","volume":"154","author":"Zhang","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"59688","DOI":"10.1109\/ACCESS.2023.3284832","article-title":"An efficient and reliable user access protocol for Internet of Drones","volume":"11","author":"Hussain","year":"2023","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"10374","DOI":"10.1109\/TVT.2022.3188769","article-title":"SLAP-IoD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments","volume":"71","author":"Yu","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Alladi, T., Venkatesh, V., Chamola, V., and Chaturvedi, N. (2021, January 10\u201313). Drone-MAP: A novel authentication scheme for drone-assisted 5G networks. Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada.","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484594"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Wu, T., Guo, X., Chen, Y., Kumari, S., and Chen, C. (2021). Amassing the security: An enhanced authentication protocol for drone communications over 5G networks. Drones, 6.","DOI":"10.3390\/drones6010010"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5827","DOI":"10.1109\/TVT.2022.3162226","article-title":"SHOTS: Scalable secure authentication-attestation protocol using optimal trajectory in UAV swarms","volume":"71","author":"Bansal","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Javed, S., Khan, M.A., Abdullah, A.M., Alsirhani, A., Alomari, A., Noor, F., and Ullah, I. (2022). An efficient authentication scheme using blockchain as a certificate authority for the internet of drones. Drones, 6.","DOI":"10.3390\/drones6100264"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Mishra, A.K., Wazid, M., Singh, D.P., Das, A.K., Singh, J., and Vasilakos, A.V. (2023). Vasilakos. Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications. Drones, 7.","DOI":"10.3390\/drones7080508"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zhang, S., Liu, Y., Han, Z., and Yang, Z. (2023). A lightweight authentication protocol for UAVs based on ECC scheme. Drones, 7.","DOI":"10.3390\/drones7050315"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Xiao, Y., and Tao, Y. (2024). SLAKA-IoD: A Secure and Lightweight Authentication and Key Agreement Protocol for Internet of Drones. Drones, 8.","DOI":"10.3390\/drones8080374"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Li, L., Lian, X., Wang, Y., and Tan, L. (2022). CSECMAS: An efficient and secure certificate signing based elliptic curve multiple authentication scheme for drone communication networks. Appl. Sci., 12.","DOI":"10.3390\/app12189203"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/LNET.2021.3116073","article-title":"Location aware clustering: Scalable authentication protocol for UAV swarms","volume":"3","author":"Bansal","year":"2021","journal-title":"IEEE Netw. Lett."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Cho, G., Cho, J., Hyun, S., and Kim, H. (2020). SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles. Appl. Sci., 10.","DOI":"10.3390\/app10093149"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"109612","DOI":"10.1016\/j.comnet.2023.109612","article-title":"LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks","volume":"224","author":"Yu","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"19790","DOI":"10.1109\/JIOT.2024.3367799","article-title":"A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones","volume":"11","author":"Bhattarai","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Alkatheiri, M.S., Saleem, S., Alqarni, M.A., Aseeri, A.O., Chauhdary, S.H., and Zhuang, Y. (2022). A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions. Electronics, 11.","DOI":"10.3390\/electronics11182921"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Canetti, R., and Krawczyk, H. (May, January 28). Universally composable notions of key exchange and secure channels. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands.","DOI":"10.1007\/3-540-46035-7_22"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/556\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:11:00Z","timestamp":1760029860000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,5]]},"references-count":43,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["sym17040556"],"URL":"https:\/\/doi.org\/10.3390\/sym17040556","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,5]]}}}