Hyperelliptic curve based authentication for the internet of drones

ABSTRACT


INTRODUCTION
Unmanned aerial vehicle (UAV) has comparable characteristics to the internet of things (IoT) technology; hence the phrase "internet of drones" was coined.Internet of drones (IoDs) is considered to be a favorable field with various potential benefits such as providing services such as traffic reconnaissance, rescue, and combinational search [1].IoD is defined as when data is forwarded for additional decision-making by a band of internet-connected vehicles with such an array of the sensor.Many drones form a network and share the collected information in the IoD environment [2].This environment can be considered an important solution thereby supporting coordination among UAVs and other issues related to UAV communications [3].Some of the application fields related to IoD are disaster management, geographic mapping, precision agriculture, search and rescue, entertainment, and aerial photography, which is shown in Figure 1.IoD comprises a combination of technologies such as cloud, edge, internet, and 5G services [4].IoD becomes a vital thing in day-to-day life for various real-time applications like monitoring defense areas, flooded areas, and land sliding areas.Thus, IoD provides support to the traveling experience with safe navigation and road safety [5]- [7].To facilitate the IoD network, the flying Ad hoc networks (FANETs) has been introduced composing drones that are used for private and public applications.Some of the interfaces which are used to control the drones are PC, internet, remote control, and cloud environment [8].Several routing and security challenges have been presented when we incorporate UAVs with IoD.Maintaining security and achieving privacy is a major challenge in IoD related to mobility and accuracy [9].Certain common trials in UAV-constructed IoD networks are routing, critical-time reaction, data acquisition, and data endorsement.Thus, it is important to do the accurate validation of data from preventing spam messages from entering the UAV [10].

Figure 1. Drone applications
The various jamming attacks that can breach security privacy are signal, global positioning system (GPS), and data.Because of these attacks, the UAV system can get collapsed and lead s to misinterpretation of data [11].Various attacks such as data packet inoculation, eavesdropping, renunciation of service, backdoor access, baiting, GPS spoofing attacks, are the one that varies from the physical layer to the application layer.
Thus, the main contribution of the proposed approach is described as follows: i) develop an approach to validate the incoming communications, and collect, analyze, and verify the data sent to IoD or UAV; ii) elucidate the methodologies related to authentication and provides more solutions based on IoT-related security applications; and iii) utilize the mathematical concepts of hyperelliptic curve cryptography for data authentication and validate the results with the existing elliptic curve approach for providing better services.

SECURITY THREATS BASED ON IOD
Nowadays threats have been increased due to unauthorized access and thereby exploiting vulnerabilities.Attacks are classified as active or passive attacks which are prone to cyber-security threats based on the fact that relies on wireless channels for communication [12].Some of the IoD vulnerabilities gray hole attacks, black hole attacks, wormhole attacks, and fake information dissemination (FID) attacks were analyzed and their performance can be measured utilizing hyperelliptic curve-based authentication algorithms [13], [14].The cyber security based on IoD attacks is mentioned in Figure 2.

Gray hole attack
The most commonly used algorithms in device-to-device (D2D) communication is optimized link state routing protocol (OLSR).One of the major attacks in OLSR is a gray hole or node isolation attack.In this attack, malicious nodes in the network interrupt the data transmission and transmit false information [15].Nodes in the network may act as both normal and malicious.Because of this attack, the topological information gets shared within the network and thereby exploiting the vulnerabilities.This may divert the paths and degrades the performance of the throughput and packet delivery ratio [16].

Blackhole attack
In this attack, whenever a node receives an route request (RREQ) packet a blackhole (BH) node starts sending forged route reply (RREP) indicating the cost-effective path even when the destination entry is missing from the routing table [17].Due to this effect, a malicious node creates the RREP packet and discards the messages received from other intermediate and destination nodes.Thus, malicious node receives all the communicated information from the connected nodes and tries to modify the information [18].

Wormhole attack
One of the major threatening attacks is a wormhole attack on UAVs in which a hostile node receives a data packet and tunnels it to another hostile node which then circulates it to the neighboring nodes [19], [20].Multiple methods are possible to establish the tunneling are a channel established out of band, a high-powered transmission, and an encapsulated attack.An attack has been created and the effect has been identified by establishing a hostile node as a decoy between the source and destination and able to perform subversions such as packet droppings and manipulation [21], [22].

FID occurrence
It is an occurrence where an aggressor transmits a fake GPS signal and variates the route of the drone.The attacker performs the attack by broadcasting interferences between the source and hostile node to depreciate the location estimated for the drone [23].There are various strategies to alleviate the problems encountered by an FID attack.The various cyber threats in a UAV have been discussed in the above content.The following section 3 comprises literature findings related to cyber threats, their challenges, and their solutions.Section 4 discusses the proposed hyperelliptic curve cryptography-based authentication.Section 5 discusses the results and discussion based on cyber threats.The last section concludes the parameter analysis and solution improvements.

RELATED WORKS
Alzahrani et al. [24] concentrated mainly on security related and presented an efficient and privacypreserving authentication protocol for the internet of vehicles (IoVs).Since the vehicle suffers from attacks such as physical, side channel, and cloning attacks the author introduces road side units (RSU) gateways.It also applies physically unclonable functions (PUFs) to guarantee security characteristics.Three-layered infrastructure architecture is proposed for IoVs for storing secret information.The proposed protocol proves that it provides lower security overhead, and higher throughput and demonstrates robustness against various types of attacks.
Aman et al. [25] demonstrated that a more accurate and efficient crowd management process can be made by unmanned aerial vehicles.The environmental-related surveillance data can be monitored and collected by UAVs for sharing information among each other.In mission-critical applications, the battery-operated UAV faced more challenges based on security and privacy.A new insubstantial validation arrangement for UAV situations was introduced to enable the weakness of the existing schemes.An intermediate control center Chen et al. [21] presented the security issues in smart internet of drone utilizing a software agent named an intelligent personal assistant.The author suggested an efficient authentication protocol named a lightweight privacy-preserving scheme using chebyshev chaotic maps.The proposed protocol proves the robustness of IoD using a verification tool and a random oracle model.This considers the desirable characteristics such as period, computational complexity, key agreement, and authentication.For speeding up the process, the methodology considered a secret token and dynamic user authentication between the communication entities.The authentication process utilized only fewer cryptographic operations to meet the constraints of surveillance systems and proves the effectiveness of the proposed protocol.
Hussain et al. [19] discussed that IoV is subject to security issues such as replay, modification, and impersonation attacks.Since there is continuous technological development in hardware where it leads to accelerated growth in IoD.Various schemes are there to measure security breaches and the proposed method considered in this work is the formal Random oracle method.For providing security between the drone and the user, the author considered an ECC and symmetric key primitives-based approach.The scheme proves a better trade-off between security and throughput for drones and is best suited for gaining surveillance.
Li et al. [14] suggested that 5G drones play a vital role in the field of various applications specifically in the military and civilian environment.This IoD can able to track individuals and enforce social distancing during the pandemic situation.However, it is suffered from issues such as security and privacy.Blockchain technology provides the solutions for the above issue and has proven that it is best suited for operative environments.
Michailidis and Vouyioukas [12] stated that the security factor is crucial since UAV operational range grows exponentially.This work discussed various cyber-attacks and their causes which impact on day-to-day normal life.The methodology discussed was the STRIDE attack paradigm which provides an effective solution for GPS spoofing and denial-of-service (DoS) attacks.Possible ways to create cyber-attacks on UAVs are password theft, brute force, and mathematical assaults.Password theft can be cracked by using symbols, phrases, and numbers.Brute force attacks can be analyzed by finding short passwords in all possible configurations.Mathematical assault can use statistical methods by guessing a byte from a word.In GPS spoofing, the attacker creates a jamming signal which interferes with the general GPS signal.Thus, malfunction was performed by using GPS spoofing attack.In a DoS attack, the intruder commands and maintains access to a UAV network.The malfunction in the DoS attack was performed by flooding the system with requests or packets.
Qureshi et al. [10] proposed the methodology named hominoid-sovereignty cooperative methodology where humanoid geo-position is used for detecting UAV cyber-attacks.An experiment named research environment for supervisory control of heterogeneous unmanned vehicles-swarm attack (RESCHU-SA) methodology is used to analyze the cyberattacks for better security guaranteed.In this work the human act as a supplementary sensor by successfully detecting a spoofing attack.
Sun et al. [9] suggested that the common cyber security threads are protocol-grounded attacks, sensorgrounded attacks, negotiated modules, and jammers.The countermeasures for protocol-based attacks are security of communication, data confidentiality protection, replay arrack, privacy leakage, and deauthentication attacks.The solution for sensor-based attacks is GPS spoofing/jamming attacks, motion sensors spoofing, and UAV spoofing/jamming attacks.The compromised component problem can be alleviated by IoT security threats and control/data interception.Similarly, jammers are denial of service and stop packet delivery.
Wu et al. [8] discussed the vulnerability of cybersecurity attacks namely DoS and DDoS attacks.One of the big challenges in UAVs is to transfer consistent data packets from the foundation to the endpoint UAV.Thus, this paper focused on DoS and DDoS attacks utilizing deep learning algorithms and analysis of the various kinds of threat casing clang-of-death attacks.A bio-inspired algorithm Ant Hoc Net practices the concept of an invasion discovery scheme and the same is to be investigated with other protocols.The model outcomes demonstrated that the anticipated process attains better security than other contemporary protocols.
Saravanan et al. [3] suggested that authentication and encryption are necessary between the drones and server for secure communication.A proposed methodology named mutual authentication and key agreement protocol is used to verify the intended user's certificate.The author suggested that to verify the certificate elliptic curve digital signature algorithm (ECDSA) algorithm is used and the elliptic-curve Diffie-Hellman (ECDH) algorithm is preferred to share the common value.Better security has been achieved by elliptic curve cryptography (ECC) even with smaller key sizes when compared to Rivest Shamir Adleman (RSA) and digital signature algorithm (DSA) signature schemes.A simpler key derivation process is followed for exchanging smaller information and communication paths between the IoD and server.

. Hyperelliptical curve cryptosystem arithmetic
Various community key cryptography approaches are available such as asymmetric cryptography algorithm, ElGamal cryptosystem, and elliptical curve crypto procedure, one of the public key cryptography protocols (PKC) which is similar to ECC is hyperelliptical curve cryptosystem (HECC).It consists of an algebraic curve viewed as an overview of elliptical curves.The genus of the HECC curve is defined as ≥ 1 whereas the genus is equal to 1 for ECC.The standard equation for HECC is normally represented 2 + ℎ() = ()where ℎ,  ∈ () is monical polynomial, degree polynomial  = 2 + 1, degree polynomial ℎ ≤  and if 2 + ℎ() = (),  ∈  *  for, then 2 + ℎ() ≠ 0.

Proposed method
Reliable and resilient is a simple public-key entity in cryptography that serves as either a digital certificate as well as an encrypt at about the same time.Cryptography and digital certificates are two fundamental cryptography tools that ensure security, trustworthiness, and quasi.This mechanism is a relatively recent cryptography approach that the service's success in a logically consistent manner.Especially compared to conventional cryptography and verification techniques, it greatly decreases storage requirements and transport overhead expenses.With such a smaller byte size and small computing costs, hyperelliptical curve encryption delivers superior protection.Both accuracy and confidentiality constraints for a decentralized cryptographic focus mainly our suggested hyperelliptic curve decentralized secret technique as shown in Figure 3.

Figure 3. Encryption and decryption mechanism for HECC protocol
The proposed methods generate two authentication tokens, one for the subgroups and the other for the exterior grouping.In a dispersed context, all of those are efficient after locating the private cryptographic key portable node or validator for subgroups as well as the exterior grouping.In this technique, the durability could be computed using the mobility node's energy.This technique is intended for portable devices with limited autonomy in a decentralized system.The HECC is an asymmetrical community key cryptography approach that uses a pair of keys.Each individual seems to have a set of community and secret keys.The secret key can be used for decrypting and signatory generation, while the community key is being used for signatory authentication as shown in Figure 4. Key contract, encrypt, and signatory approaches are three types of schemes built on hyperelliptic curve cryptographic is discussed in following subsection.

Key contract
To produce the pair of keys, the client uses the HECC protocol.The pair of keys are denoted by the characters   , , with   denoting the community key and  denoting the secret key.Although the Diffie-Hellman-based consensus mechanism was created for the multiplication series of data, this can simply be adapted to other categories.Look at the case of , groups where members could be effectively expressed but whose grouping functions could be effectively The grouping consists of hyperelliptic curve Jacobians.Let us assume the succeeding community factors: − The grouping ′′.− A component  ∈ of the larger prime directive .

Encrypt/decrypt approach
When transferring the information to the cloud, the information owner would encrypt them using the community key   → .The computed hash function is saved for later validation, and the encrypted information is transferred to the internet.If  wishes to transmit  an information packet, it must first transmit  to . − It achieves the community key   of receiver user .Whenever an information customer requires to view a document, a downloading query is sent to the internet, and the information is decrypted using a cipher text.The hashing calculation is performed once more when the material has been retrieved.When comparing files, the authenticity of the files can now be confirmed.Because the document would be uploaded to the cloud, a hashing code is compared would be useful in determining whether a document is flawless while still on the server.The "receive user"  can decipher the cloud documents by undertaking the succeeding: − Receive the user the cipher text of the document ( 1 ,  2 ) from the source .− Evaluate the information assessment  =  2 −  1 .

Signatory approaches
The electronic signatures process could be used to generate and verify every grouping  certificate.Transmitter  must accomplish the following to authenticate a document .Indicate an arbitrary integer  ∈ [1,  − 1], and estimate  = : − Estimate s from () and .

−
To "authenticate this signatory at the receiving end, the authenticator B has to carry out the following steps".

RESULTS AND DISCUSSION
The proposed model is simulated on NS3 to pronounce the broadcast among various drones through secure authentication for every drone happening through wireless networks.Numerical analysis of the proposed approach is preeminent over conventional methodologies such as elliptic curve cryptographic source The performance of communication overhead shown in Figure 5 proves that the proposed HEC delivers an average of 44.60% of overheads that are reduced as compared with other conventional approaches.The proposed methodology reduces the overhead by 7.07%, 18.96%, and 99.14% when compared with ECCCPSAS, NLWUAS, and MAS respectively.The enactment of packet delivery is shown in Figure 6 demonstrates that the proposed HEC delivers on an average 10.85% increase in delivery of packets as compared with other conservative approaches.The projected methodology increases the packet delivery ratio by 2.4%, 14.3%, and 15.9% when compared with ECCCPSAS, NLWUAS, and MAS respectively.The performance of throughput shown in Figure 7 proves that the proposed HEC delivers an average 49.9 % increase in throughput as compared with other conventional approaches.The proposed methodology increases the throughput by 87.11%, 26.63%, and 35.8% when compared with ECCCPSAS, NLWUAS, and MAS respectively.The performance of termination to termination delay is shown in Figure 8 proves that the proposed HEC delivers an average 62.65% decrease in termination to termination delay as compared with other conventional approaches.The proposed methodology decreases end-to-end delay by 8.73%, 80.63%, and 98.6% when compared with ECCCPSAS, NLWUAS, and MAS respectively.

CONCLUSION
The proposed hyperelliptical curve cryptosystem based substantiation methodology is proposed to protect validation services among users in progressive grid schemes.This method also provisions for sharing information between users/drones with server configurations using efficient authentication.There is an improved quality of service (QoS) constraint regarding data transmission when employing the proposed methodology.When compared to ECCCPSAS, NLWUAS, and MAS, the proposed methodology enhances throughput by 87.11%, 26.63%, and 35.8%, respectively.And also, the HEC reduces end-to-end delay by an average of 62.65% with lower end-to-end delay by 8.73%, 80.63%, and 98.6% when compared to ECCCPSAS, NLWUAS, and MAS, respectively.As compared to existing previous methodologies, the proposed one ensures perfect secrecy and privacy using an authentication approach.This can be extended shortly by implementing some hybrid approaches based on the hyperelliptic curve cryptosystem.

Int
Hyperelliptic curve based authentication for the internet of drones (Aloy Anuja Mary Gnanaraj) 135


ISSN: 2089-4864 Int J Reconfigurable & Embedded Syst, Vol. 13, No. 1, March 2024: 133-142 136 provides authentication between the user and UAV.The performance requirement of the UAV has been fulfilled utilizing the symmetrical key and elliptical curve crypto mechanism.
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864  Hyperelliptic curve based authentication for the internet of drones (Aloy Anuja Mary Gnanaraj)

Figure 4 .
Figure 4. Authentication model in the cloud
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864  Hyperelliptic curve based authentication for the internet of drones (Aloy Anuja Mary Gnanaraj) 139 authentication scheme based on chebyshev polynomial (ECCCPSAS), novel light weight user authentication system (NLWUAS), and multilayer authentication strategy (MAS) by taking into account various parameters such as announcement overhead, envelope transfer proportion, and output delivery.