Main Article Content
Drones are now being used in various fields. One of the uses of drones is for delivery service. When delivering goods, the drone needs to report its condition while traveling to the server so that the server can monitor the drone and the server can give some commands to the drone. However, when the drone receives data from the server, there are many vulnerabilities it has against the attacker that can take control of the drone device. Taking control of the drone can occur if the attacker manages to send a script that can take over control of the drone. If the attacker can take control over the drone device, the attacker can steal the drone both physically or data of the drone. For this reason, in this study, we propose an authentication algorithm that can filter out who is allowed to send data to the system. The algorithm used is Zero-Knowledge Authentication. To improve the performance of the Zero-Knowledge Authentication algorithm in terms of authentication speed, we try to combine it with the secret key generated from the Secret Key Generation process. From the results of authentication testing, the effectiveness of the proposed algorithm after a Brute Force attack experiment is 100% for single attacker scenarios and for multiple attackers the effectiveness is 100% in LOS and NLOS conditions. Because drones have limited resources, the authentication time experiment is also performed and the result is that in all scenarios the time required to authenticate is in microseconds so that the proposed algorithm can be implemented on drones with limited resources.
 Choudhary, Gaurav & Sharma, Vishal & Gupta, Takshi & Kim, Jiyoon & You, Ilsun. “Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives”, 2015.
 M. Farooq., M. Waseem., A. Khairi., & S. Mazhar.. “A Critical Analysis on the Security Concerns of Internet of Things (IoT)”. International Journal of Computer Applications, vol. 111, no. 7, pp. 1–6, 2015.
 Debasmita. D., & G. Biswas. “Efficient Entity Authentication Using Modified Guillou–Quisquater Zero-Knowledge Protocol”. 2020.
 S. Paramanik. “Comparison of Zero Knowledge”, NATIONAL INSTITUTE OF ROURKELA TECHNOLOGY, 2014.
 A. Sudarsono, M. Yuliana and P. Kristalina, "A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in The Wireless Networks," 2018 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), Bali, 2018, pp. 170-175.
 C. Nisa., A. Sudarsono., & Y. Mike. “RSS-based Secret Key Establishment using MiddlePoint Quantization and Clover Filter Algorithm”. International Electronics Symposium (IES), IEEE, 2020.
 Z. Li, Q. Pei, I. Markwood, Y. Liu and H. Zhu, "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 3, pp. 802-817, March 2018.
 X. Zhou & X. Tang. “Research and Implementation of RSA Algorithms for Encryption and Decryption”. The 6th International Forum on Strategic Technology, 2011, IEEE.
 AS Rawat and M. Deshmukh, "Efficient Extended Diffie-Hellman Key Exchange Protocol," 2019 International Conference on Computing, Power and Communication Technologies (GUCON), 2019, pp. 447-451.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.