An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things

被引:4
|
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [2 ,3 ]
Shetty, Sachin [4 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[4] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Dept Computat Modeling & Simulat Engn, Suffolk, VA 23435 USA
关键词
Internet of Space Things (IoST); authentication; key management; security; simulation; COMMUNICATION; BIOMETRICS; EXCHANGE; PROTOCOL; SCHEME;
D O I
10.1109/TITS.2023.3338274
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of Space Things (IoST), also known as CubeSats, elaborates the uses and functionalities of traditional Internet of Things (IoT) by not only providing a constantly available satellite back-haul network, but also by providing real-time satellite-captured data. IoST can be applied for various applications, like weather forecasting, navigation, satellite phone, satellite TV, satellite Internet, radio, military, and many more. It requires support of mechanisms of Intelligent Transportation System (ITS). In an IoST communication environment, the communication among various users, satellite access points, ground stations, and smart IoT devices occur through insecure channels, i.e., Internet. Due the transmission of data over an insecure channel, various potential attacks are possible. Due to the existence of various attacks, the important data of IoST may be altered or revealed. To mitigate these issues, an authentication and key management framework for secure and intelligent transportation of IoST has been proposed (in short, SAKM-IoST). Through the proposed SAKM-IoST, a legitimate user can access the data of ground station in a secure way. The security analysis reveals that SAKM-IoST is resilient against a variety of potential threats and attacks. Additionally, SAKM-IoST's performance is compared with other approaches that are similar in nature. It has been noted that SAKM-IoST offers robust security, in addition to extra functional characteristics. Therefore, SAKM-IoST seems to be more suitable for its deployment in the critical applications of the IoST as compared to other competing approaches.
引用
收藏
页码:5242 / 5257
页数:16
相关论文
共 50 条
  • [1] A computationally intelligent hierarchical authentication and key establishment framework for the internet of things
    Haghighi, Mohammad Sayad
    Nader, Orwa
    Jolfaei, Alireza
    IEEE Internet of Things Magazine, 2020, 3 (04): : 36 - 39
  • [2] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [3] A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
    Rao, Patruni Muralidhara
    Deebak, B. D.
    AD HOC NETWORKS, 2023, 146
  • [4] Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
    Meena, Uma
    Sharma, Promila
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (02) : 1753 - 1781
  • [5] Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
    Uma Meena
    Promila Sharma
    Wireless Personal Communications, 2022, 125 : 1753 - 1781
  • [6] PSAF-IoT: Physically Secure Authentication Framework for the Internet of Things
    Alruwaili, Omar
    Alotaibi, Faisal Mohammed
    Tanveer, Muhammad
    Chaoui, Slim
    Armghan, Ammar
    IEEE ACCESS, 2024, 12 : 78549 - 78561
  • [7] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [8] Distributed Multiparty Key Management for Efficient Authentication in the Internet of Things
    Mahmood, Zahid
    Ullah, Ata
    Ning, Huansheng
    IEEE ACCESS, 2018, 6 : 29460 - 29473
  • [9] A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
    Peivandizadeh, Ali
    Adarbah, Haitham Y.
    Molavi, Behzad
    Mohajerzadeh, Amirhossein
    Al-Badi, Ali H.
    FUTURE INTERNET, 2024, 16 (10)
  • [10] Secure authentication and session key management scheme for Internet of Vehicles
    Sharma, Nishant
    Chauhan, Naveen
    Chand, Narottam
    Awasthi, Lalit Kumar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (05):