Privacy Preservation and Drone Authentication Using ID-Based Signcryption

被引:15
作者
Benzarti, Sana [1 ]
Triki, Bayrem [1 ]
Korbaa, Ouajdi [1 ]
机构
[1] Univ Sousse, Modeling Automated Reasoning Lab, MARS Lab, ISITCom, Hammam Sousse, Tunisia
来源
NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18) | 2018年 / 303卷
关键词
Drone; UAV; ID-Based Signcryption; authentication; privacy preservation; RFID tags; temporary identity;
D O I
10.3233/978-1-61499-900-3-226
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
By the recent years, the use of UAV (Unmanned Aerial Vehicle) also known as drone have witnessed a remarkable increase. Drones are no longer limited for military services as in the past. They are able to carry out civilian missions like survivor search operations after natural disasters, accidents, especially in the most difficult conditions, such as meteorological conditions and inaccessible or dangerous geographical locations. Moreover with the invasion of a new era, which is the IoT (Internet of Things), carrying a big wave of connected objects, we can talk about drone based IoT. The problem is how can we control such a connected object by preserving the privacy and security of users. The principal goal is to build a new secured architecture to provide a high security level. This architecture will control drones and promote them to an upper level connected with the IoT and the big data paradigms. We propose in this paper an architecture that relies on Id-Based Signcryption and RFID tags.
引用
收藏
页码:226 / 239
页数:14
相关论文
共 27 条
[1]  
[Anonymous], WHY DRONES ARE FUTUR
[2]  
[Anonymous], 2002098 CRYPT EPRINT
[3]  
BOUACHIR O., 2014, THESIS
[4]   MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles [J].
Habibi, Javid ;
Gupta, Aditi ;
Carlson, Stephen ;
Panicker, Ajay ;
Bertino, Elisa .
2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, :642-652
[5]  
Haddad Z. J., 2017, EGYPT INFORM J
[6]  
Hooper M, 2016, IEEE MILIT COMMUN C, P1213, DOI 10.1109/MILCOM.2016.7795496
[7]  
Jain U, 2017, 2017 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS)
[8]   A new taxonomy of routing algorithms for wireless mobile ad hoc networks: The component approach [J].
Lee, Myung Jong ;
Zheng, Jianling ;
Hu, Xuhui ;
Juan, Hsin-Hui ;
Zhu, Chunhui ;
Liu, Yong ;
Yoon, June Seung ;
Saadawi, Tarek N. .
IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (11) :116-123
[9]  
Liu Y, 2017, IEEE INT C INTELL TR
[10]  
Luo M., 2017, INT J NETWORK SECURI, V19, P966