five

ProVerif simulation code.

收藏
NIAID Data Ecosystem2026-05-02 收录
下载链接:
https://figshare.com/articles/dataset/ProVerif_simulation_code_/28566756
下载链接
链接失效反馈
官方服务:
资源简介:
Drones have limited computing and storage resources, which makes them unable to perform complex tactical tasks; drones working in clusters can be employed for such complex tactical task completion. But, the synergy between these drones working in clusters is mandatory. Otherwise, the adversary can easily target them, disturb their routine work, and even disturb the whole system. Only a robust and lightweight authentication protocol can handle both information fusion and collaboration and coordination of drones working in clusters efficiently and effectively and is one of the essential components of the Internet of Drones (IoD) environment as it is deployed for quick and intelligent decisions. In this regard, the already available security mechanisms for IoD deployment drones have either design flaws or failed to provide security against session key disclosure, spoofing, man in the middle (MITM), and denial of service (DoS) attacks. Therefore, this article presents a protocol based on elliptic curve cryptography (ECC), one-way hash, concatenation, and exclusive-OR (XOR) operations to establish a secure communication session among drones which makes them a powerful system to perform complex tactical tasks and information fusion intelligently. The security analysis of the proposed protocol has formally been scrutinized via BAN logic and ProVerif and informally via realistic discussion and illustrations. The results obtained from the analysis sections demonstrate that the proposed protocol is robust in security and is 63.87% more efficient in terms of communication cost compared to its competitors, and 66.46% better in terms of computational cost.
创建时间:
2025-03-10
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作