BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service

被引:3
作者
Bera, Basudeb [1 ]
Bisht, Abhishek [2 ]
Das, Ashok Kumar [2 ]
Bhargava, Bharat [3 ]
Yau, David K. Y. [4 ]
Lorenz, Pascal [5 ]
Sikdar, Biplab [1 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[4] Singapore Univ Technol & Design, Informat Syst Technol & Design, Singapore 487372, Singapore
[5] Univ Haute Alsace, F-68008 Colmar, France
关键词
Drones; Security; Blockchains; Wireless sensor networks; Global Positioning System; Biometrics (access control); Wireless communication; Air smart vehicular network (ASVN); authentication; security; blockchain; Scyther; testbed experiments; 3-FACTOR AUTHENTICATION; SECURITY; INTERNET; FRAMEWORK; LIGHTWEIGHT; EXCHANGE;
D O I
10.1109/TVT.2024.3380392
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Air Smart Vehicular Networks (ASVNs) have become increasingly essentials in military and commercial industries in recent years, where drones are deployed to interact among each other via wireless medium in airspace due to their agility and versatility. ASVNs can form a closed loop from data perception to final execution by integrating communication devices, computation tools, and control modules. However, the used unencrypted and publicly available navigational signals like Global Positioning System (GPS) and communication over (public) insecure Internet connections, including wireless networks and WiFi, make ASVNs vulnerable to security breaches. Attackers can easily gain access to a drone's configuration and take control remotely, by launching various attacks such as GPS spoofing, false sensor data injection, maldrone malware injection, eavesdropping, man-in-the-middle, Denial-of-Service (DoS), replay, forgery, and Skyjack attacks. This paper proposes a robust and efficient multi-factor biometric-based security mechanism using blockchain as a service to address the security and privacy breaches in ASVNs. A comparative study demonstrates that the proposed scheme provides superior security and better functionality features with low communication and computation overheads as compared to the existing analogous schemes. The feasibility of the proposed scheme in real-life drone applications is also demonstrated through a real-time testbed and blockchain simulation. Furthermore, a detailed security analysis using the automated software validation tool, namely Scyther, verifies the proposed scheme's significant level of security.
引用
收藏
页码:9478 / 9494
页数:17
相关论文
共 52 条
[21]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[22]  
Kumar R., 2023, Cyber Secur. Appl., V1
[23]   Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments [J].
Li, Wei ;
Li, Xuelian ;
Gao, Juntao ;
Wang, Haiyu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1276-1290
[24]   Practical Threshold Multi-Factor Authentication [J].
Li, Wenting ;
Cheng, Haibo ;
Wang, Ping ;
Liang, Kaitai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :3573-3588
[25]   Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network [J].
Li, Xinghua ;
Wang, Yunwei ;
Vijayakumar, Pandi ;
He, Debiao ;
Kumar, Neeraj ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (11) :11309-11322
[26]  
Luo A., 2018, Int.J.Commun.Syst., V31
[27]   The security of Internet of drones [J].
Lv, Zhihan .
COMPUTER COMMUNICATIONS, 2019, 148 :208-214
[28]  
Lynn B ..., 2001, The tate pairing
[29]   A survey on security and privacy issues of UAVs [J].
Mekdad, Yassine ;
Aris, Ahmet ;
Babun, Leonardo ;
El Fergougui, Abdeslam ;
Conti, Mauro ;
Lazzeretti, Riccardo ;
Uluagac, Selcuk .
COMPUTER NETWORKS, 2023, 224
[30]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552