Computer Communications 162 (2020) 102–117 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom A smart lightweight privacy preservation scheme for IoT-based UAV communication systems B.D. Deebak a, , Fadi Al-Turjman b a School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India b Artificial Intelligence Department, Research Center for AI and IoT, Near East University, Nicosia, Mersin 10, Turkey ARTICLE INFO Keywords: Unmanned aerial vehicle Internet of drone Authentication Session-key agreement Privacy-preserving ABSTRACT Unmanned Aerial Vehicle (UAV) has extensively been practiced in the military and civilian surveillance systems that access sensitive data over the cellular networks. However, channel insecurity and battery limitation may not protect the aerial coverage area. Thus, sensitive information gathered through aerial vehicles causes security threats. To manage the security issues, Smart Internet of Drone (S-IoD) have been evolved to use Intelligent Personal Assistant (IPA) as a software agent while monitoring and observing areas of interest. The current state-of-the-art technologies provide ubiquitous communication to enable several Internet of Things (IoT) paradigms. It achieves a feature of a decision support system that allows the smart interaction and communication between real-time entities. IPA offers smart interaction with other smart real-time entities to gain the user’s knowledge and awareness. This paper presents an S-IoD framework for a UAV environment that independently collects sensible information. In order to reduce the computation cost of the authentication protocol, a lightweight privacy-preserving scheme (L-PPS) is introduced. The proposed L-PPS is constructive to provide the robustness between the IoT devices with a valid authentication period. To demonstrate the security and performance efficiencies, the formal verification was performed using a verification tool, Scyther, and a random oracle model. In addition, the proposed L-PPS introduces a secret token and dynamic user authentication to speed up the authentication process between the communication entities. Importantly, the authentication session of L-PPS does not use any complex cryptographic operations, whereby it has less computation and communication costs to meet the standard constraints of surveillance systems. Moreover, the obtained simulation analysis proves that the proposed L-PPS achieves better quality metrics than other authentication schemes in the literature. 1. Introduction Autonomous unmanned aerial vehicles (UAVs) also known as drones have attracted the researches attention for environmental challenges in- cluding relay communication, disaster monitoring, border surveillance, etc. [1,2]. A small multirotor or multicopter is particularly in practice to ease the device deployment, data acquisition, and device mainte- nance [3]. In research, device development has addressed several con- trolling issues of the multicopter for the design of autonomous vehicles such as aerial stability, robustness, and maneuverability. The techno- logical advancements and the commercial demands have brought the existence of collaborative UAV-systems for the deployment of multiple aerial vehicles. Due to small operation costs, less maintenance, easy configuration, and user-friendliness, the operational use of UAV has drastically expanded. Most of the environments utilize the UAV system to exploit the essential qualities of the environment such as uncertainty, complexity, and dynamic nature. To function the UAV system, effi- cient resources including communication and networking are adopted. Corresponding author. E-mail addresses: deebak.bd@vit.ac.in (B.D. Deebak), fadi.alturjman@neu.edu.tr (F. Al-Turjman). It enables multiple UAVs to cooperate with each other in ad hoc networks to achieve autonomous operations. With the integration of power management, sensor coordination, artificial intelligence, and additional emerging technologies, innovative product so-called UAV has lately been commercialized. The commercialized UAV has incredi- ble development in different network fields and communication tasks, which have boundless adaptability in several application domains. It has some additional features such as in-flight photography, business entertainment, and commercial enterprises to monitor real-time activ- ities, such as disaster relief, infrastructure inspection, and surveillance applications [4]. Nader et al. [5] discussed the use of a smart city and its related application services in terms of quality, efficiency, suitability, consistency, and performance. They have complex security inferences to give a summary of a single-threat whereby UAV cannot launch or violate the data privacy and security services. However, the commercialized UAV addresses several security measures to prevent the passive/active attacks. The different assessments are as follows. https://doi.org/10.1016/j.comcom.2020.08.016 Received 28 April 2020; Received in revised form 24 June 2020; Accepted 25 August 2020 Available online 27 August 2020 0140-3664/© 2020 Elsevier B.V. All rights reserved.