IEEE Access (Jan 2024)

Adversarial Security Analysis of Cryptographic Protocols for IoD Networks

  • Snehal Samanth,
  • Prema K. V.,
  • Mamatha Balachandra

DOI
https://doi.org/10.1109/ACCESS.2024.3510778
Journal volume & issue
Vol. 12
pp. 183792 – 183808

Abstract

Read online

Drones are limited-resource aircraft without a human pilot on board. They are used for area surveillance and information gathering, which they then relay to a Ground Control Station (GCS) or other drones in the network. Due to the vast amounts of data transmission in an Internet of Drones (IoD) network, it is vulnerable to different cyber attacks. Our previous works deal with cryptographic algorithms i.e. an Authenticated Key Agreement (AKA) algorithm named Elliptic Curve Cryptography based AKA integrating Timestamps and Trigonometric concepts (ECCTST) and an encryption algorithm named Customized Lightweight Encryption Algorithm (CLEA)-256 for a legitimate IoD network. Also, the review of the previous works shows that the execution of real-time adversarial attacks on cryptographic protocols is an area to explore. Hence, our proposed work proves the robustness of our previous works on cryptographic protocols, which have been done using a Raspberry Pi (RPi) 4 B-based drone installed with Kali Linux OS as the attacker. The data preparation by the legitimate drone and 12 sessions of legitimate communications happen between the drone and the GCS, and the legitimate communications are captured using Wireshark. Adversarial security analysis has detected ample randomizations in the captured ECCTST-based data and the captured CLEA-256-based data, which indicates the robustness of our previous works on ECCTST and CLEA-256 and the integration of the 2 for secure communications in an IoD network.

Keywords