BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service

被引:1
作者
Bera, Basudeb [1 ]
Bisht, Abhishek [2 ]
Das, Ashok Kumar [2 ]
Bhargava, Bharat [3 ]
Yau, David K. Y. [4 ]
Lorenz, Pascal [5 ]
Sikdar, Biplab [1 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[4] Singapore Univ Technol & Design, Informat Syst Technol & Design, Singapore 487372, Singapore
[5] Univ Haute Alsace, F-68008 Colmar, France
关键词
Drones; Security; Blockchains; Wireless sensor networks; Global Positioning System; Biometrics (access control); Wireless communication; Air smart vehicular network (ASVN); authentication; security; blockchain; Scyther; testbed experiments; 3-FACTOR AUTHENTICATION; SECURITY; INTERNET; FRAMEWORK; LIGHTWEIGHT; EXCHANGE;
D O I
10.1109/TVT.2024.3380392
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Air Smart Vehicular Networks (ASVNs) have become increasingly essentials in military and commercial industries in recent years, where drones are deployed to interact among each other via wireless medium in airspace due to their agility and versatility. ASVNs can form a closed loop from data perception to final execution by integrating communication devices, computation tools, and control modules. However, the used unencrypted and publicly available navigational signals like Global Positioning System (GPS) and communication over (public) insecure Internet connections, including wireless networks and WiFi, make ASVNs vulnerable to security breaches. Attackers can easily gain access to a drone's configuration and take control remotely, by launching various attacks such as GPS spoofing, false sensor data injection, maldrone malware injection, eavesdropping, man-in-the-middle, Denial-of-Service (DoS), replay, forgery, and Skyjack attacks. This paper proposes a robust and efficient multi-factor biometric-based security mechanism using blockchain as a service to address the security and privacy breaches in ASVNs. A comparative study demonstrates that the proposed scheme provides superior security and better functionality features with low communication and computation overheads as compared to the existing analogous schemes. The feasibility of the proposed scheme in real-life drone applications is also demonstrated through a real-time testbed and blockchain simulation. Furthermore, a detailed security analysis using the automated software validation tool, namely Scyther, verifies the proposed scheme's significant level of security.
引用
收藏
页码:9478 / 9494
页数:17
相关论文
共 52 条
[1]   Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks [J].
Adavoudi-Jolfaei, AmirHosein ;
Ashouri-Talouki, Maede ;
Aghili, Seyed Farhad .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) :43-59
[2]   A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance [J].
Akram, Muhammad Wahid ;
Bashir, Ali Kashif ;
Shamshad, Salman ;
Saleem, Muhammad Asad ;
AlZubi, Ahmad Ali ;
Chaudhry, Shehzad Ashraf ;
Alzahrani, Bander A. ;
Bin Zikria, Yousaf .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) :19634-19643
[3]  
Aliand R., 2018, Int. J. Commun. Syst., V31
[4]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[5]  
[Anonymous], 2021, IEEESyst. J., V15, P5557
[6]   Novel and Secure Blockchain Framework for Health Applications in IoT [J].
Bataineh, Marah R. ;
Mardini, Wail ;
Khamayseh, Yaser M. ;
Yassein, Muneer Masadeh Bani .
IEEE ACCESS, 2022, 10 :14914-14926
[7]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[8]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[9]   A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments [J].
Chang, Ya-Fen ;
Tai, Wei-Liang ;
Hou, Po-Lin ;
Lai, Kuan-Yu .
SYMMETRY-BASEL, 2021, 13 (07)
[10]  
Core repository for sawtooth distributed ledger,, 2016, about Us