Improved Computational Diffie-Hellman-Based Mechanism for Cyber-Physical Security
Souhayla Dargaoui (),
Abdeslem Blali (),
Mourade Azrour (),
Ahmad El Allaoui (),
Fatima Amounas (),
Azidine Guezzaz and
Abdulatif Alabdulatif ()
Additional contact information
Souhayla Dargaoui: IMIA laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes
Abdeslem Blali: IMIA laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes
Mourade Azrour: IMIA laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes
Ahmad El Allaoui: IMIA laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes
Fatima Amounas: IMIA laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes
Azidine Guezzaz: Cadi Ayyad University, SISAR Team, LaRTID Laboratory, Higher School of Technology Essaouira
Abdulatif Alabdulatif: Qassim University, Department of Computer Science, College of Computer
A chapter in Reliability in Cyber-Physical Systems: The Human Factor Perspective, 2026, pp 219-227 from Springer
Abstract:
Abstract Cyber-physical systems (CPS) generally refer to complex systems with multiple dimensions that combine computation and communication technologies with physical environment interactions. Such systems are widely accepted in smart agriculture, military applications, and other life scenarios. The Internet of drones as a CPS presents various security issues, vulnerabilities, and dangers for customers. Recently, we proposed a PUF-based semi-centralized authentication scheme for Drone-to-Drone communication to secure such networks. Our previous scheme has presented a significant improvement in computation and communication overheads. However, it can encounter difficulties in managing large networks with thousands of drones. In this paper, we provide an improved authentication scheme for peer-to-peer drone communication that mitigates scalability issues. Our protocol significantly improves computation cost, requiring only 0.172 ms while preserving security and scalability. It also necessitates an acceptable amount of communication overhead compared to similar protocols.
Keywords: Cybersecurity; Internet of drones; Authentication (search for similar items in EconPapers)
Date: 2026
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:ssrchp:978-3-032-09917-4_14
Ordering information: This item can be ordered from
http://www.springer.com/9783032099174
DOI: 10.1007/978-3-032-09917-4_14
Access Statistics for this chapter
More chapters in Springer Series in Reliability Engineering from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().