Smart City Gnosys

Smart city article details

Title G2Caiun: A Novel Genus-2 Curve-Based Authentication For Secure Data Transmission In Iot-Based Uav Networks
ID_Doc 27632
Authors Sharma J.; Singh Mehra P.
Year 2025
Published Physical Communication, 71
DOI http://dx.doi.org/10.1016/j.phycom.2025.102647
Abstract Unmanned Aerial Vehicles (UAVs) within the Internet of Things (IoT) ecosystem are the networks which are used to collect, process and share data in real-time to support applications like smart agriculture, environment monitoring and disaster management. The communication among UAVs, GCS (Ground Control Station) and External Users (EU) is vulnerable to adversary attacks such as man-in-the-middle, eavesdropping, replay, session key disclosure, impersonation and physical tampering attacks in smart cities scenarios. Most existing studies are based on securing communication between EU and UAV through GCS but do not come across the UAV–UAV and UAV–GCS authentication solutions, which are crucial for UAVs. Therefore, to overcome these problems, this paperwork comes with a lightweight and provable secure mutual authentication scheme which utilises the Hyperelliptic curve (HC) of Genus-2, one-way hash function, XOR operation, random tokens, anonymous identity and timestamps for secure data transmission in EU–GCS–UAV, UAV–GCS and UAV–UAV environment. The proposed scheme is also secured with a lightweight Physical Unclonable Function (PUF) operation to prevent physical capture attacks. The solution provides high security without the intensive computation (2.5 ms) and communication overhead (1456 bits) compared to existing schemes, which rely on bilinear-pairing, quadratic residue theory and elliptic curves of Genus-1. The scheme is formally verified using the Random Oracle Model (ROM) and Scyther under the Dolev–Yao (DY) and Canetti and Krawczyk (CK) adversary models. The informal analysis shows the provable security assessment to make IoT-based UAV networks robust. © 2025 Elsevier B.V.
Author Keywords Authentication; Drones; Hyperelliptic curve; Internet of Things; PUF; Security; Unmanned aerial vehicle


Similar Articles


Id Similarity Authors Title Published
28808 View0.917Sharma J.; Mehra P.S.Hcfaiun: A Novel Hyperelliptic Curve And Fuzzy Extractor-Based Authentication For Secure Data Transmission In Iot-Based Uav NetworksVehicular Communications, 49 (2024)
4485 View0.902Sharma J.; Mehra P.S.A Secure Cryptosystem For Secure Data Transmission In Iot-Based Uav Networks2024 2nd International Conference on Advancements and Key Challenges in Green Energy and Computing, AKGEC 2024 (2024)
2326 View0.878Li Y.; Du X.; Zhou S.A Lightweight Identity Authentication Scheme For Uav And Road Base StationsACM International Conference Proceeding Series (2020)
12576 View0.878Ju S.; Park H.; Son S.; Kim H.; Park Y.; Park Y.Blockchain-Assisted Secure And Lightweight Authentication Scheme For Multi-Server Internet Of Drones EnvironmentsMathematics, 12, 24 (2024)
44857 View0.869Pratap B.; Singh A.; Mehra P.S.Rehas: Robust And Efficient Hyperelliptic Curve-Based Authentication Scheme For Internet Of DronesConcurrency and Computation: Practice and Experience, 37, 3 (2025)
5764 View0.868Jan S.U.; Abbasi X.A.; Algarni F.; Khan A.S.A Verifiably Secure Ecc Based Authentication Scheme For Securing Iod Using FanetIEEE Access, 10 (2022)
30837 View0.853Pizzolante R.; Castiglione A.; Palmieri F.; Passaro A.; Zaccagnino R.; La Vecchia S.Improving Drone Security In Smart Cities Via Lightweight CryptographyLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 14109 LNCS (2023)