A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems

被引:9
作者
Alzahrani B.A. [1 ]
Barnawi A. [1 ]
Chaudhry S.A. [2 ]
机构
[1] Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah
[2] Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul
来源
Security and Communication Networks | 2021年 / 2021卷
关键词
D O I
10.1155/2021/3437373
中图分类号
学科分类号
摘要
As a part of the smart city revolution, crowd management is an emerging trend and it can enhance the quality of life. Unmanned ariel vehicles (UAVs) can help in making the crowd management process more efficient and more accurate. UAVs can monitor and collect environmental-related surveillance data and share real-time information with each other and with the decision makers. However, the battery-operated UAVs communicate over the open public channel making the privacy and security of the UAVs a crucial element in mission-critical applications. The weaknesses of the existing scheme pave the way to design a new lightweight authentication scheme for UAV environments. In this article, we present a symmetric key primitive-based scheme and provide authentication among a user and a UAV through an intermediate control center. Due to usage of symmetric key and elliptic curve cryptography, the proposed scheme fulfils the performance requirements of the UAVs. The security of the proposed scheme is substantiated through BAN logic, along with a discussion on security features extended by the proposed scheme. The performance and security comparisons show that the proposed scheme provides adequate security and efficiency and can be practically deployed in real UAV environments. © 2021 Bander A. Alzahrani et al.
引用
收藏
相关论文
共 31 条
  • [1] Gharibi M., Boutaba R., Waslander S.L., Internet of drones, IEEE Access, 4, pp. 1148-1162, (2016)
  • [2] Chaudhry S.A., Yahya K., Karuppiah M., Kharel R., Bashir A.K., Zikria Y.B., Gcacs-iod: A certificate based generic access control scheme for internet of drones, Computer Networks, 191, (2021)
  • [3] Hussain S., Chaudhry S.A., Alomari O.A., Alsharif M.H., Khan M.K., Kumar N., Amassing the security: An ECC-based authentication scheme for internet of drones, IEEE Systems Journal, 15, 3, pp. 4431-4438, (2021)
  • [4] Maddikunta P.K.R., Hakak S., Alazab M., Bhattacharya S., Gadekallu T.R., Khan W.Z., Pham Q.-V., Unmanned aerial vehicles in smart agriculture: Applications, requirements, and challenges, IEEE Sensors Journal, 21, 16, (2021)
  • [5] Li B., Fei Z., Zhang Y., UAV communications for 5g and beyond: Recent advances and future trends, IEEE Internet of Things Journal, 6, 2, pp. 2241-2263, (2018)
  • [6] Wu Y., Dai H.-N., Wang H., Choo K.K.R., Blockchain-based privacy preservation for 5G-enabled drone communications, IEEE Network, 35, 1, pp. 50-56, (2021)
  • [7] Tan L., Xiao H., Yu K., Aloqaily M., Jararweh Y., A blockchain-empowered crowdsourcing system for 5G-enabled smart cities, Computer Standards and Interfaces, 76, (2021)
  • [8] Deebak B.D., Turjman F.A., A smart lightweight privacy preservation scheme for iot-based UAV communication systems, Computer Communications, 162, pp. 102-117, (2020)
  • [9] Dolev D., Yao A., On the security of public key protocols, IEEE Transactions on Information Theory, 29, 2, pp. 198-208, (1983)
  • [10] Irshad A., Sher M., Ahmad H.F., Alzahrani B.A., Chaudhry S.A., Kumar R., An improved multi-server authentication scheme for distributed mobile cloud computing services, KSII Transactions on Internet and Information Systems, 10, 12, pp. 5529-5552, (2016)