A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System

被引:57
作者
Chaudhry, Shehzad Ashraf [1 ]
Irshad, Azeem [2 ]
Khan, Muhammad Asghar [3 ]
Khan, Sajjad Ahmad [4 ]
Nosheen, Summera [5 ]
AlZubi, Ahmad Ali [6 ]
Zikria, Yousaf Bin [7 ]
机构
[1] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, Istanbul 34310, Turkiye
[2] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 44000, Pakistan
[3] Hamdard Univ, Dept Elect Engn, Islamabad 44000, Pakistan
[4] Istanbul Tech Univ ITU, Fac Elect & Elect Engn, Elect & Commun Engn Dept, Istanbul 34469, Turkiye
[5] Univ Newcastle, Sch Elect Engn & Comp, Univ Dr, Callaghan, NSW, Australia
[6] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11437, Saudi Arabia
[7] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
6G mobile communication; Drones; Authentication; Security; Internet of Things; Transportation; Satellites; Device access control; maritime transportation system; device impersonation; forged message; IoT access; KEY AGREEMENT SCHEME; USER AUTHENTICATION; INTERNET; FRAMEWORK; NETWORKS; EXCHANGE; SECURITY;
D O I
10.1109/TITS.2021.3134643
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning to the Maritime Transportation System (MTS) when enabled through satellite systems. Although modern MTS has gained significant benefits from Internet of Things (IoT) and 6G technologies, threats and challenges in terms of security and privacy have also been grown substantially. Tracking the location of vessels, GPS spoofing, unauthorized access to data, and message tampering are some of the potential security and privacy vulnerabilities in the 6G-IoT enabled MTS. In this article, we propose a lightweight authentication protocol for a 6G-IoT enabled maritime transportation system to efficiently assist and ensure the security and privacy of maritime transportation systems. To validate the security characteristics, formal security assessment methods are utilized, i.e., Real-Or-Random (ROR) oracle model. The findings of the security analysis show that the proposed scheme is more secure than the existing schemes.
引用
收藏
页码:2401 / 2410
页数:10
相关论文
共 38 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks [J].
Al-Turjman, Fadi ;
Ever, Yoney Kirsal ;
Ever, Enver ;
Nguyen, Huan X. ;
David, Deebak Bakkiam .
IEEE ACCESS, 2017, 5 :24617-24631
[3]   A clogging resistant secure authentication scheme for fog computing services [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid ;
Garg, Sahil ;
Lv, Zhihan ;
Bin Zikria, Yousaf .
COMPUTER NETWORKS, 2021, 185
[4]   A robust authentication and access control protocol for securing wireless healthcare sensor networks [J].
Ali, Zeeshan ;
Ghani, Anwar ;
Khan, Imran ;
Chaudhry, Shehzad Ashraf ;
Islam, S. K. Hafizul ;
Giri, Debasis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[5]   A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE [J].
Arul, Rajakumar ;
Raja, Gunasekaran ;
Bashir, Ali Kashif ;
Chaudry, Junaid ;
Ali, Amjad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2677-2689
[6]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[7]   Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment [J].
Chaudhry, Shehzad Ashraf ;
Irshad, Azeem ;
Yahya, Khalid ;
Kumar, Neeraj ;
Alazab, Mamoun ;
Bin Zikria, Yousaf .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
[8]   Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment [J].
Cui, Jie ;
Zhang, Xiaoyu ;
Zhong, Hong ;
Zhang, Jing ;
Liu, Lu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1654-1667
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]   An In-Depth Security Assessment of Maritime Container Terminal Software Systems [J].
Eichenhofer, Joseph O. ;
Heymann, Elisa ;
Miller, Barton P. ;
Kang, Arnold .
IEEE ACCESS, 2020, 8 :128050-128067