A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks

被引:17
作者
Abdel-Malek, Mai A. [1 ,3 ]
Akkaya, Kemal [1 ]
Bhuyan, Arupjyoti [2 ]
Ibrahim, Ahmed S. [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] INL Wireless Secur Inst, Idaho Natl Lab, Idaho Falls, ID 83415 USA
[3] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Drones; Authentication; Device-to-device communication; 5G mobile communication; Security; Standards; Protocols; 5G security; authentication; D2D; drones; delegation; proxy signature; COMMUNICATION; SCHEME; INTERNET; BLOCKCHAIN; PROTOCOL;
D O I
10.1109/ACCESS.2022.3178121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones are imperative for the 5G architecture as a mobile source to expand network coverage and support seamless services, particularly through enabling device-to-device (D2D) communication. Such deployment of drones in D2D settings raises various security threats in drone communication. While the existing D2D communication security standard within the 4G cellular architecture may address some of these issues, the standard includes heavy traffic toward the network core servers. If this security standard is to be adopted in the 5G D2D security services with the same traffic load, it may negatively impact the 5G network performance. Therefore, this paper proposes a lightweight proxy signature-based authentication mechanism for a swarm of drones compatible with the 5G D2D standard mechanisms. This paper proposes a distributed delegation-based authentication mechanism to reduce the traffic overhead toward the 5G core network. In this scheme, the legitimate drones are authorized as proxy delegated signers to perform authentication on behalf of the core network. Furthermore, we propose a mechanism to elect and relocate a new leader relay drone from the existing drone swarm. We implemented the proposed authentication algorithm in the 5G D2D-based communication package over NS-3 while performing the computational calculations on a RaspberryPi3 device to mimic the drone calculation process and delays. The performance of the proposed authentication shows a promising reduction in the authentication time and shows lightweight and reliable compatibility.
引用
收藏
页码:57485 / 57498
页数:14
相关论文
共 50 条
  • [31] IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks
    Meshram, Chandrashekhar
    Imoize, Agbotiname Lucky
    Elhassouny, Azeddine
    Aljaedi, Amer
    Alharbi, Adel R.
    Jamal, Sajjad Shaukat
    IEEE ACCESS, 2021, 9 : 131336 - 131347
  • [32] Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks
    Zhang, Jing
    Zhong, Hong
    Cui, Jie
    Tian, Miaomiao
    Xu, Yan
    Liu, Lu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) : 7940 - 7954
  • [33] In the Digital Age of 5G Networks: Seamless Privacy-Preserving Authentication for Cognitive-Inspired Internet of Medical Things
    Deebak, B. D.
    Memon, Fida Hussain
    Khowaja, Sunder Ali
    Dev, Kapal
    Wang, Weizheng
    Qureshi, Nawab Muhammad Faseeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 8916 - 8923
  • [34] An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks
    Huang, Haiou
    Hu, Liang
    Chu, Jianfeng
    Cheng, Xiaochun
    IEEE ACCESS, 2019, 7 : 175970 - 175979
  • [35] Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure
    Garg, Tanya
    Gupta, Shashank
    Obaidat, Mohammad S.
    Raj, Meghna
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 8725 - 8788
  • [36] Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks
    Thumbur, Gowri
    Rao, G. Srinivasa
    Reddy, P. Vasudeva
    Gayathri, N. B.
    Reddy, D. V. R. Koti
    Padmavathamma, M.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1908 - 1920
  • [37] BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, Srinivasulu U.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 403 - 419
  • [38] Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
    Jangirala, Srinivas
    Das, Ashok Kumar
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7081 - 7093
  • [39] Location based Authentication Service using 4G/5G Devices
    Nisar, Farhan
    2019 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2019, : 120 - 126
  • [40] Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
    Mishra, Amit Kumar
    Wazid, Mohammad
    Singh, Devesh Pratap
    Das, Ashok Kumar
    Singh, Jaskaran
    Vasilakos, Athanasios V.
    DRONES, 2023, 7 (08)