A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System

被引:49
作者
Chaudhry, Shehzad Ashraf [1 ]
Irshad, Azeem [2 ]
Khan, Muhammad Asghar [3 ]
Khan, Sajjad Ahmad [4 ]
Nosheen, Summera [5 ]
AlZubi, Ahmad Ali [6 ]
Zikria, Yousaf Bin [7 ]
机构
[1] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, Istanbul 34310, Turkiye
[2] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 44000, Pakistan
[3] Hamdard Univ, Dept Elect Engn, Islamabad 44000, Pakistan
[4] Istanbul Tech Univ ITU, Fac Elect & Elect Engn, Elect & Commun Engn Dept, Istanbul 34469, Turkiye
[5] Univ Newcastle, Sch Elect Engn & Comp, Univ Dr, Callaghan, NSW, Australia
[6] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11437, Saudi Arabia
[7] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
6G mobile communication; Drones; Authentication; Security; Internet of Things; Transportation; Satellites; Device access control; maritime transportation system; device impersonation; forged message; IoT access; KEY AGREEMENT SCHEME; USER AUTHENTICATION; INTERNET; FRAMEWORK; NETWORKS; EXCHANGE; SECURITY;
D O I
10.1109/TITS.2021.3134643
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning to the Maritime Transportation System (MTS) when enabled through satellite systems. Although modern MTS has gained significant benefits from Internet of Things (IoT) and 6G technologies, threats and challenges in terms of security and privacy have also been grown substantially. Tracking the location of vessels, GPS spoofing, unauthorized access to data, and message tampering are some of the potential security and privacy vulnerabilities in the 6G-IoT enabled MTS. In this article, we propose a lightweight authentication protocol for a 6G-IoT enabled maritime transportation system to efficiently assist and ensure the security and privacy of maritime transportation systems. To validate the security characteristics, formal security assessment methods are utilized, i.e., Real-Or-Random (ROR) oracle model. The findings of the security analysis show that the proposed scheme is more secure than the existing schemes.
引用
收藏
页码:2401 / 2410
页数:10
相关论文
共 38 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks
    Al-Turjman, Fadi
    Ever, Yoney Kirsal
    Ever, Enver
    Nguyen, Huan X.
    David, Deebak Bakkiam
    [J]. IEEE ACCESS, 2017, 5 : 24617 - 24631
  • [3] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    [J]. COMPUTER NETWORKS, 2021, 185
  • [4] A robust authentication and access control protocol for securing wireless healthcare sensor networks
    Ali, Zeeshan
    Ghani, Anwar
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Giri, Debasis
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [5] A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE
    Arul, Rajakumar
    Raja, Gunasekaran
    Bashir, Ali Kashif
    Chaudry, Junaid
    Ali, Amjad
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) : 2677 - 2689
  • [6] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [7] Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
    Chaudhry, Shehzad Ashraf
    Irshad, Azeem
    Yahya, Khalid
    Kumar, Neeraj
    Alazab, Mamoun
    Bin Zikria, Yousaf
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
  • [8] Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment
    Cui, Jie
    Zhang, Xiaoyu
    Zhong, Hong
    Zhang, Jing
    Liu, Lu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 1654 - 1667
  • [9] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [10] An In-Depth Security Assessment of Maritime Container Terminal Software Systems
    Eichenhofer, Joseph O.
    Heymann, Elisa
    Miller, Barton P.
    Kang, Arnold
    [J]. IEEE ACCESS, 2020, 8 (08): : 128050 - 128067