PSL-IoD: PUF-Based Secure Last-Mile Drone Delivery in Supply Chain Management

Guardat en:
Dades bibliogràfiques
Publicat a:Mathematics vol. 13, no. 13 (2025), p. 2143-2163
Autor principal: Alahmadi, Mohammad D
Altres autors: Alzahrani, Ahmed S, Irshad Azeem, Chaudhry, Shehzad Ashraf
Publicat:
MDPI AG
Matèries:
Accés en línia:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!

MARC

LEADER 00000nab a2200000uu 4500
001 3229153581
003 UK-CbPIL
022 |a 2227-7390 
024 7 |a 10.3390/math13132143  |2 doi 
035 |a 3229153581 
045 2 |b d20250101  |b d20251231 
084 |a 231533  |2 nlm 
100 1 |a Alahmadi, Mohammad D  |u Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah 23890, Saudi Arabia; mdalahmadi@uj.edu.sa 
245 1 |a PSL-IoD: PUF-Based Secure Last-Mile Drone Delivery in Supply Chain Management 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a The conventional supply chain management has undergone major advancements following IoT-enabled revolution. The IoT-enabled drones in particular have ignited much recent attention for package delivery in logistics. The service delivery paradigm in logistics has seen a surge in drone-assisted package deliveries and tracking. There have been a lot of recent research proposals on various aspects of last-mile delivery systems for drones in particular. Although drones have largely changed the logistics landscape, there are many concerns regarding security and privacy posed to drones due to their open and vulnerable nature. The security and privacy of involved stakeholders needs to be preserved across the whole chain of Supply Chain Management (SCM) till delivery. Many earlier studies addressed this concern, however with efficiency limitations. We propose a Physical Uncloneable Function (PUF)-based secure authentication protocol (PSL-IoD) using symmetric key operations for reliable last-mile drone delivery in SCM. PSL-IoD ensures mutual authenticity, forward secrecy, and privacy for the stakeholders. Moreover, it is protected from machine learning attacks and drone-related physical capture threats due to embedded PUF installations along with secure design of the protocol. The PSL-IoD is formally analyzed through rigorous security assessments based on the Real-or-Random (RoR) model. The PSL-IoD supports 26.71% of enhanced security traits compared to other comparative studies. The performance evaluation metrics exhibit convincing findings in terms of efficient computation and communication along with enhanced security features, making it viable for practical implementations. 
653 |a Cryptography 
653 |a Agreements 
653 |a Forgery 
653 |a Performance evaluation 
653 |a Threats 
653 |a Security 
653 |a Protocol 
653 |a Communication 
653 |a Unmanned aerial vehicles 
653 |a Privacy 
653 |a Machine learning 
653 |a Access control 
653 |a Efficiency 
653 |a Smart cities 
653 |a Comparative studies 
653 |a Artificial intelligence 
653 |a Digital transformation 
653 |a Supply chain management 
653 |a Design 
653 |a Blockchain 
653 |a Drones 
653 |a Algorithms 
653 |a Logistics 
653 |a Supply chains 
700 1 |a Alzahrani, Ahmed S  |u Civil Engineering Department, King Abdulaziz University, Jeddah 21589, Saudi Arabia; asmalzahrani2@kau.edu.sa 
700 1 |a Irshad Azeem  |u Faculty of Computer Science, Punjab Higher Education Department, Govt Graduate College Asghar Mall Rawalpindi, Rawalpindi 46040, Pakistan 
700 1 |a Chaudhry, Shehzad Ashraf  |u Department of Computer Science and Information Technology, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates; shehzad.ashraf@adu.ac.ae 
773 0 |t Mathematics  |g vol. 13, no. 13 (2025), p. 2143-2163 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3229153581/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3229153581/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3229153581/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch