Blockchain-based privacy-preserving authentication protocol for UAV networks

被引:21
作者
Akram, Muhammad Arslan [1 ]
Ahmad, Hira [1 ]
Mian, Adnan Noor [1 ]
Jurcut, Anca Delia [2 ]
Kumari, Saru [3 ]
机构
[1] Informat Technol Univ, Lahore, Pakistan
[2] Univ Coll Dublin Belfield, Sch Comp Sci, Dublin, Ireland
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut, India
关键词
Authentication protocol; Information security; UAV networks; KEY AGREEMENT PROTOCOL; MUTUAL AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; ATTESTATION SCHEME; PROVABLY-SECURE; EFFICIENT; DRONES; COMMUNICATION; SERVICES; INTERNET;
D O I
10.1016/j.comnet.2023.109638
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) are getting common in the market nowadays and being used in numerous real-time applications because they are lightweight, cost-effective, easy to control. With the growth of emerging UAV technology, it also needs to improve the security in many applications that are using this technology for solving multipurpose use cases. However, the malicious use of UAVs threatens privacy and security, so there is an immense need to secure critical information by preventing the UAVs from being tampered with denial of service (DoS) attacks, impersonation attacks, and man-in-the-middle attacks. To fulfill such a goal, in this paper, we design a new blockchain-envisioned authenticated key agreement mechanism in a UAV network. We prove the security of our proposed protocol using the random oracle model and also with the AVISPA tool under the given adversarial model. We also provide the informal security analysis that shows the protocol is secure against various attacks such as man-in-the-middle attack, denial of service attack and impersonation attack. Furthermore, to realize the performance of our proposed protocol, we perform comparative analysis in terms of security features, communication, and computation costs. We show that the proposed protocol performs better than Kaur et al. by 10.45%. Finally, the comparative analysis shows that the proposed protocol offers better communication and computation performance and added security features as compared to the state-of-the-art authentication protocols.
引用
收藏
页数:12
相关论文
共 53 条
[21]  
Fisher D., 2012, FINAL REPORT DIGINOT, P2013
[22]  
Fromknecht C., 2014, Tech. Rep. 6
[23]   A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN [J].
Gupta, Ankur ;
Tripathi, Meenakshi ;
Sharma, Aakar .
COMPUTER COMMUNICATIONS, 2020, 160 :311-325
[24]   A Distributed Framework for Energy Trading Between UAVs and Charging Stations for Critical Applications [J].
Hassija, Vikas ;
Chamola, Vinay ;
Krishna, Dara Nanda Gopala ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (05) :5391-5402
[25]   Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory [J].
Hassija, Vikas ;
Saxena, Vikas ;
Chamola, Vinay .
COMPUTER COMMUNICATIONS, 2020, 149 :51-61
[26]   COMMUNICATION SECURITY OF UNMANNED AERIAL VEHICLES [J].
He, Daojing ;
Chan, Sammy ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (04) :134-139
[27]  
Hooper M, 2016, IEEE MILIT COMMUN C, P1213, DOI 10.1109/MILCOM.2016.7795496
[28]   A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet-Based Vehicle-to-Grid Technology Framework [J].
Irshad, Azeem ;
Usman, Muhammad ;
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shafiq, Muhammad .
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2020, 56 (04) :4425-4435
[29]  
Jia X., 2022, IEEE INTERNET THINGS
[30]   On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services [J].
Jiang, Qi ;
Ma, Jianfeng ;
Wei, Fushan .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :2039-2042