HOOPOE: High Performance and Efficient Anonymous Handover Authentication Protocol for Flying Out of Zone UAVs

被引:13
作者
Khalid, Haqi [1 ]
Hashim, Shaiful Jahari [2 ]
Hashim, Fazirulhisyam [1 ]
Ahamed, Sharifah Mumtazah Syed [1 ]
Chaudhary, Muhammad Akmal [3 ]
Altarturi, Hamza H. M. [4 ]
Saadoon, Muntadher [5 ]
机构
[1] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Serdang 43400, Malaysia
[2] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Fak Kejuruteraan, Serdang 43400, Malaysia
[3] Ajman Univ, Dept Elect & Comp Engn, Coll Engn & Informat Technol, Ajman 13306, U Arab Emirates
[4] Univ Malaya, Dept Comp Syst & Technol, Kuala Lumpur 58100, Malaysia
[5] Univ Malaya, Dept Software Engn, Kuala Lumpur 50603, Malaysia
关键词
UAVs; authentication; handover; security; and privacy; OMNeT plus; KEY AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; INTERNET; COMMUNICATION; SECURITY; PRIVACY; IOD; CHALLENGES; EXCHANGE; DESIGN;
D O I
10.1109/TVT.2023.3262173
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The unmanned aerial vehicles (UAVs) in military and civilian systems access sensitive data via cellular networks and are ubiquitous. Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to the wireless connectivity. For example, a UAV initially served by cell A may be handed over to cell B after a certain point. Therefore, Security and privacy concerns raise if there is a change in the flight path of the UAV due to wide-area connectivity traffic management, including authentication threats as well as the leakage of identity, location, and flying routes. Also, drones are resource-constrained devices that cannot perform extensive operations, leading to the inability to resist drone capture attacks and impersonation attacks. Therefore, this paper presents a high-performance and efficient anonymous handover authentication protocol to secure the drone traveling path. The protocol utilizes the advantages of the AES-RSA algorithm to provide efficient and secure key management and a fast verification and signature generation that speeds up drone authentication. The protocol's security was proved using the formal verification ROR model and automated security verifier ProVerif tool to validate the protocol resistance against various attacks and provided forward secrecy. In addition, the performance of the proposed protocol is evaluated using the OMNeT++ simulator in terms of communication, computation cost, energy consumption, packet drop ratio, end-to-end delay, and throughput. The results showed that the protocol achieves better security, efficiency, and performance than other protocols.
引用
收藏
页码:10906 / 10920
页数:15
相关论文
共 43 条
[1]   Applications, Deployments, and Integration of Internet of Drones (IoD): A Review [J].
Abualigah, Laith ;
Diabat, Ali ;
Sumari, Putra ;
Gandomi, Amir H. .
IEEE SENSORS JOURNAL, 2021, 21 (22) :25532-25546
[2]  
Akihabara N., 2021, NTT docomo giving range to drone flights
[3]  
Akihabara N., 2021, Securing drones from hackers
[4]   Research Challenges and Opportunities in Drone Forensics Models [J].
Al-Dhaqm, Arafat ;
Ikuesan, Richard A. ;
Kebande, Victor R. ;
Razak, Shukor ;
Ghabban, Fahad M. .
ELECTRONICS, 2021, 10 (13)
[5]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[6]   Survey on Collaborative Smart Drones and Internet of Things for Improving Smartness of Smart Cities [J].
Alsamhi, Saeed H. ;
Ma, Ou ;
Ansari, Mohammad Samar ;
Almalki, Faris A. .
IEEE ACCESS, 2019, 7 :128125-128152
[7]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy R. ;
Youssef A.M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[8]  
Alzahrani Bander A., 2021, Security and Communication Networks, DOI [10.1155/2021/3437373, 10.1155/2021/3437373]
[9]   UAV assistance paradigm: State-of-the-art in applications and challenges [J].
Alzahrani, Bander ;
Oubbati, Omar Sami ;
Barnawi, Ahmed ;
Atiquzzaman, Mohammed ;
Alghazzawi, Daniyal .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 166
[10]   Authentication and Handover Challenges and Methods for Drone Swarms [J].
Aydin, Yucel ;
Kurt, Gunes Karabulut ;
Ozdemir, Enver ;
Yanikomeroglu, Halim .
IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2022, 6 :220-228