Blockchain-based privacy-preserving authentication protocol for UAV networks

被引:21
作者
Akram, Muhammad Arslan [1 ]
Ahmad, Hira [1 ]
Mian, Adnan Noor [1 ]
Jurcut, Anca Delia [2 ]
Kumari, Saru [3 ]
机构
[1] Informat Technol Univ, Lahore, Pakistan
[2] Univ Coll Dublin Belfield, Sch Comp Sci, Dublin, Ireland
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut, India
关键词
Authentication protocol; Information security; UAV networks; KEY AGREEMENT PROTOCOL; MUTUAL AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; ATTESTATION SCHEME; PROVABLY-SECURE; EFFICIENT; DRONES; COMMUNICATION; SERVICES; INTERNET;
D O I
10.1016/j.comnet.2023.109638
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) are getting common in the market nowadays and being used in numerous real-time applications because they are lightweight, cost-effective, easy to control. With the growth of emerging UAV technology, it also needs to improve the security in many applications that are using this technology for solving multipurpose use cases. However, the malicious use of UAVs threatens privacy and security, so there is an immense need to secure critical information by preventing the UAVs from being tampered with denial of service (DoS) attacks, impersonation attacks, and man-in-the-middle attacks. To fulfill such a goal, in this paper, we design a new blockchain-envisioned authenticated key agreement mechanism in a UAV network. We prove the security of our proposed protocol using the random oracle model and also with the AVISPA tool under the given adversarial model. We also provide the informal security analysis that shows the protocol is secure against various attacks such as man-in-the-middle attack, denial of service attack and impersonation attack. Furthermore, to realize the performance of our proposed protocol, we perform comparative analysis in terms of security features, communication, and computation costs. We show that the proposed protocol performs better than Kaur et al. by 10.45%. Finally, the comparative analysis shows that the proposed protocol offers better communication and computation performance and added security features as compared to the state-of-the-art authentication protocols.
引用
收藏
页数:12
相关论文
共 53 条
[1]   Efficient Security Scheme for Disaster Surveillance UAV Communication Networks [J].
Abdallah, Asmaa ;
Ali, M. Zulfiker ;
Misic, Jelena ;
Misic, Vojislav B. .
INFORMATION, 2019, 10 (02)
[2]   Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks [J].
Al-Turjman, Fadi ;
Ever, Yoney Kirsal ;
Ever, Enver ;
Nguyen, Huan X. ;
David, Deebak Bakkiam .
IEEE ACCESS, 2017, 5 :24617-24631
[3]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[4]   A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario [J].
Alladi, Tejasvi ;
Chakravarty, Sombuddha ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :14188-14197
[5]   Consumer IoT: Security Vulnerability Case Studies and Solutions [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Sikdar, Biplab ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) :17-25
[6]   Drone services: issues in drones for location-based services from human-drone interaction to information processing [J].
Alwateer, M. ;
Loke, S. W. ;
Zuchowicz, A. M. .
JOURNAL OF LOCATION BASED SERVICES, 2019, 13 (02) :94-127
[7]   A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks [J].
Alzahrani, Bander A. ;
Chaudhry, Shehzad Ashraf ;
Barnawi, Ahmed ;
Al-Barakati, Abdullah ;
Alsharif, Mohammed H. .
SYMMETRY-BASEL, 2020, 12 (02)
[8]  
Axon L., 2016, 14 INT C SECURITY CR
[9]  
Bacco M., 2018, 2018 IOT VERTICAL TO, DOI [10.1109/IOT-, DOI 10.1109/IOT-TUSCANY.2018.8373043]
[10]   Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function [J].
Bansal, Gaurang ;
Naren, Naren ;
Chamola, Vinay ;
Sikdar, Biplab ;
Kumar, Neeraj ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) :7234-7246