An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things

被引:6
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [2 ,3 ]
Shetty, Sachin [4 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[4] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Dept Computat Modeling & Simulat Engn, Suffolk, VA 23435 USA
关键词
Internet of Space Things (IoST); authentication; key management; security; simulation; COMMUNICATION; BIOMETRICS; EXCHANGE; PROTOCOL; SCHEME;
D O I
10.1109/TITS.2023.3338274
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of Space Things (IoST), also known as CubeSats, elaborates the uses and functionalities of traditional Internet of Things (IoT) by not only providing a constantly available satellite back-haul network, but also by providing real-time satellite-captured data. IoST can be applied for various applications, like weather forecasting, navigation, satellite phone, satellite TV, satellite Internet, radio, military, and many more. It requires support of mechanisms of Intelligent Transportation System (ITS). In an IoST communication environment, the communication among various users, satellite access points, ground stations, and smart IoT devices occur through insecure channels, i.e., Internet. Due the transmission of data over an insecure channel, various potential attacks are possible. Due to the existence of various attacks, the important data of IoST may be altered or revealed. To mitigate these issues, an authentication and key management framework for secure and intelligent transportation of IoST has been proposed (in short, SAKM-IoST). Through the proposed SAKM-IoST, a legitimate user can access the data of ground station in a secure way. The security analysis reveals that SAKM-IoST is resilient against a variety of potential threats and attacks. Additionally, SAKM-IoST's performance is compared with other approaches that are similar in nature. It has been noted that SAKM-IoST offers robust security, in addition to extra functional characteristics. Therefore, SAKM-IoST seems to be more suitable for its deployment in the critical applications of the IoST as compared to other competing approaches.
引用
收藏
页码:5242 / 5257
页数:16
相关论文
共 38 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   The Internet of Space Things/CubeSats: A ubiquitous cyber-physical system for the connected world [J].
Akyildiz, Ian F. ;
Kak, Ahan .
COMPUTER NETWORKS, 2019, 150 :134-149
[3]  
[Anonymous], 2021, DATABASES AWS
[4]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[5]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[6]   An authentication and key agreement protocol for satellite communications [J].
Chang, Chin-Chen ;
Cheng, Ting-Fang ;
Wu, Hsiao-Ling .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) :1994-2006
[7]   Chaotic Map-Based Authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle [J].
Cui, Jie ;
Yu, Jing ;
Zhong, Hong ;
Wei, Lu ;
Liu, Lu .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (03) :3167-3181
[8]   An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System [J].
Das, Ashok Kumar ;
Bruhadeshwar, Bezawada .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
[9]   A Secure Blockchain Enabled V2V Communication System Using Smart Contracts [J].
Das, Debashis ;
Banerjee, Sourav ;
Chatterjee, Pushpita ;
Ghosh, Uttam ;
Biswas, Utpal .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (04) :4651-4660
[10]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523