REFERENCES
Agray, N., Van Der Hoek, W., and De Vink, E. (2001). On
ban logics for industrial security protocols. In Inter-
national Workshop of Central and Eastern Europe on
Multi-Agent Systems, pages 29–36. Springer.
Ali, Z., Chaudhry, S. A., Ramzan, M. S., and Al-Turjman,
F. (2020). Securing smart city surveillance: A
lightweight authentication mechanism for unmanned
vehicles. IEEE Access, 8:43711–43724.
Alladi, T., Bansal, G., Chamola, V., Guizani, M., et al.
(2020a). Secauthuav: A novel authenti cation scheme
for uav-ground station and uav-uav communica-
tion. IEEE Transactions on Vehicular Technology,
69(12):15068–15077.
Alladi, T., Chamola, V., Kumar, N., et al. (2020b). Parth: A
two-stage lightweight mutual authentication protocol
for uav surveillance networks. Computer Communi-
cations, 160:81–90.
Alsamhi, S. H., Ma, O., Ansari, M. S., and Almalki, F. A.
(2019). Survey on collaborative smart drones and
internet of things for improving smartness of smart
cities. Ieee Access, 7:128125–128152.
Canetti, R., Goldreich, O., and Halevi, S. (2004). The ran-
dom oracle methodology, revisited. Journal of the
ACM (JACM), 51(4):557–594.
Choudhary, G., Sharma, V., Gupta, T., Kim, J., and You,
I. (2018). Internet of drones (iod): threats, vul-
nerability, and security perspectives. arXivpreprint
arXiv:1808.00203.
Ene, C., Laskhnech, Y., and Ngo, V. C. (2009). For-
mal indistinguishability extended to t he random ora-
cle model. In European Symposium on Research in
Computer Security, pages 555–570. Springer.
Frikken, K. B., Blanton, M., and Atallah, M. J. (2009). Ro-
bust authentication using physically unclonable func-
tions. In International Conference on Information Se-
curity, pages 262–277. Springer.
Gope, P., Millwood, O., and Saxena, N. (2021). A provably
secure authentication scheme for rfid-enabled uav ap-
plications. Computer Communications, 166:19–25.
Gope, P. and Sikdar, B. (2020). An efficient privacy-
preserving authenticated key agreement scheme for
edge-assisted internet of drones. IEEE Transactions
on Vehicular Technology, 69( 11):13621–13630.
Hussain, S., Chaudhry, S. A., Alomari, O. A., Al sharif,
M. H., Khan, M. K., and Kumar, N. (2021). Amassing
the security: An ecc-based authentication scheme for
internet of drones. IEEE Systems Journal.
Jan, S., Qayum, F., and Khan, H. (2021). Design and analy-
sis of lightweight authentication protocol for securing
iod. IEEE Access, 9:69287–69306.
Lin, C., He, D., Kumar, N., Choo, K.-K. R., Vinel, A., and
Huang, X. (2018). Security and privacy for the inter-
net of drones: Challenges and solutions. IEEE Com-
munications Magazine, 56(1):64–69.
Lv, Z. (2019). The security of internet of drones. Computer
Communications, 148:208–214.
Paulson, L. C. (1997). Proving properties of security pro-
tocols by induction. In Proceedings 10th Computer
Security Foundations Workshop, pages 70–83. IEEE.
Rogaway, P. and Shrimpton, T. (2004). Cryptographic hash-
function basics: Defi nit ions, implications, and sepa-
rations for preimage resistance, second-preimage re-
sistance, and collision resistance. In International
workshop on fast software encryption, pages 371–388.
Springer.
Shi, J., Lu, Y., and Zhang, J. (2019). Approxima-
tion attacks on strong pufs. IEEE transactions on
computer-aided design of integrated circuits and sys-
tems, 39(10):2138–2151.
Srinivas, J., Das, A. K., Kumar, N., and Rodrigues, J. J.
(2019). Tcalas: Temporal credential-based anony-
mous lightweight authentication scheme for internet
of drones environment. IEEE Transactions on Vehic-
ular Technology, 68(7):6903–6916.
Tian, Y. , Yuan, J., and Song, H. (2019). Effi-
cient privacy-preserving authentication framework for
edge-assisted internet of drones. Journal of Informa-
tion Security and Applications, 48:102354.
Vigano, L. (2006). Automated security protocol analysis
with the avispa tool. Electronic Notes in Theoretical
Computer Science, 155:61–86.
Wang, A., Tan, W., Wen, Y., and Lao, Y. (2021). Nopuf: A
novel puf design framework toward modeling attack
resistant pufs. IEEE Transactions on Circuits and Sys-
tems I: Regular Papers, 68(6):2508–2521.
Wu, L., H u, Y., Zhang, K., Li, W., Xu, X., and Chang,
W. (2022). Flam-puf: A response feedback-based
lightweight anti-machine learning-attack puf. IEEE
Transactions on Computer-Aided Design of Integrated
Circuits and Systems.
Yahuza, M., Idris, M. Y. I., Wahab, A. W. A., Nandy, T.,
Ahmedy, I. B., and Ramli, R. (2021). An edge as-
sisted secure lightweight authentication technique for
safe communication on the internet of drones network.
IEEE Access, 9:31420–31440.
Yu, W. and Wen, Y. (2019). Efficient hybrid side-
channel/machine learning attack on xor pufs. Elec-
tronics Letters, 55(20):1080–1082.
Zhang, Y., He, D., Li, L., and Chen, B. (2020). A
lightweight authentication and key agreement scheme
for internet of drones. Computer Communications,
154:455–464.