R3 AC WU: A Lightweight, Trust worthy Authentication Scheme for UAV-Assisted IoT Applications

被引:6
作者
Adil, Muhammad [1 ]
Abulkasim, Hussein [2 ,3 ]
Farouk, Ahmed [4 ]
Song, Houbing [5 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14060 USA
[2] Univ Sci & Technol Fujairah, Coll Engn & Technol, Fujairah, U Arab Emirates
[3] New Valley Univ, Fac Sci, El Kharga 72511, Egypt
[4] South Valley Univ, Fac Comp & Artificial Intelligence, Dept Comp Sci, Hurghada 83523, Egypt
[5] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21250 USA
关键词
UAV-assisted IoT applications; device-to-device authentication; data privacy; R3ACWU protocol; cryptography; public and private key exchange; PHYSICAL-LAYER SECURITY; COMMUNICATION; PROTOCOL; INTERNET;
D O I
10.1109/TITS.2023.3342831
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The technology of Unmanned Aerial Vehicles (UAVs) has sparked a revolution in numerous Internet of Things (IoT) applications, such as flood monitoring, wildfire monitoring, coastal area surveillance, intelligent transportation, and classified military operations, etc. This technology offers several advantages when used as a flying base station to enhance the communication metrics of an employed IoT appplication. However, as an integrated technology (UAV-assisted IoT applications), it suffers from many challenges, and security is one of the foremost concerns. Considering that, in this paper, we proposed a hybrid lightweight key exchange authentication model for UAV-assisted IoT applications to resolve the device-to-device (D2D) authentication and data privacy issues in these networks. The proposed model employs five different security parameters named registration, authentication, authorization, accounting, and cache wash and update (R3ACWU) in coordination with a hash function. The network architecture consists of UAVs, IoT devices, and micro base stations, followed by base stations, authentication servers, and service providers (SP). In this framework, we introduce a concept known as 'dead time', a specific time period after which each device's cache memory is cleared and updated. This practice not only enhances the security of the devices in use but also reduces computational and memory overhead by eliminating the records of devices that haven't participated in the communication process within the specified time frame. Results statistics of our lightweight R3ACWU authentication scheme exhibit notable improvement corresponded to the present authentication schemes in terms of comparative parameters.
引用
收藏
页码:6161 / 6172
页数:12
相关论文
共 27 条
[1]  
Adil M., IEEE TRANSINTELL VEH
[2]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[3]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy R. ;
Youssef A.M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[4]   Secure Distribution of Protected Content in Information-Centric Networking [J].
Bilal, Muhammad ;
Pack, Sangheon .
IEEE SYSTEMS JOURNAL, 2020, 14 (02) :1921-1932
[5]   Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks [J].
Butun, Ismail ;
Erol-Kantarci, Melike ;
Kantarci, Burak ;
Song, Houbing .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :47-53
[6]   Chaotic Map-Based Authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle [J].
Cui, Jie ;
Yu, Jing ;
Zhong, Hong ;
Wei, Lu ;
Liu, Lu .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (03) :3167-3181
[7]   A smart lightweight privacy preservation scheme for IoT-based UAV communication systems [J].
Deebak, B. D. ;
Al-Turjman, Fadi .
COMPUTER COMMUNICATIONS, 2020, 162 :102-117
[8]   Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges [J].
Fotouhi, Azade ;
Qiang, Haoran ;
Ding, Ming ;
Hassan, Mahbub ;
Giordano, Lorenzo Galati ;
Garcia-Rodriguez, Adrian ;
Yuan, Jinhong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3417-3442
[9]   Softwarized Industrial Deterministic Networking Based on Unmanned Aerial Vehicles [J].
Guan, Yunchong ;
Zhao, Liang ;
Hu, Jia ;
Lin, Na ;
Alhamid, Mohammed F. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5635-5644
[10]   DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles [J].
Gulati, Amuleen ;
Aujla, Gagangeet Singh ;
Chaudhary, Rajat ;
Kumar, Neeraj ;
Obaidat, Mohammad ;
Benslimane, Abderrahim .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) :2520-2534