A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks

被引:17
作者
Abdel-Malek, Mai A. [1 ,3 ]
Akkaya, Kemal [1 ]
Bhuyan, Arupjyoti [2 ]
Ibrahim, Ahmed S. [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] INL Wireless Secur Inst, Idaho Natl Lab, Idaho Falls, ID 83415 USA
[3] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Drones; Authentication; Device-to-device communication; 5G mobile communication; Security; Standards; Protocols; 5G security; authentication; D2D; drones; delegation; proxy signature; COMMUNICATION; SCHEME; INTERNET; BLOCKCHAIN; PROTOCOL;
D O I
10.1109/ACCESS.2022.3178121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones are imperative for the 5G architecture as a mobile source to expand network coverage and support seamless services, particularly through enabling device-to-device (D2D) communication. Such deployment of drones in D2D settings raises various security threats in drone communication. While the existing D2D communication security standard within the 4G cellular architecture may address some of these issues, the standard includes heavy traffic toward the network core servers. If this security standard is to be adopted in the 5G D2D security services with the same traffic load, it may negatively impact the 5G network performance. Therefore, this paper proposes a lightweight proxy signature-based authentication mechanism for a swarm of drones compatible with the 5G D2D standard mechanisms. This paper proposes a distributed delegation-based authentication mechanism to reduce the traffic overhead toward the 5G core network. In this scheme, the legitimate drones are authorized as proxy delegated signers to perform authentication on behalf of the core network. Furthermore, we propose a mechanism to elect and relocate a new leader relay drone from the existing drone swarm. We implemented the proposed authentication algorithm in the 5G D2D-based communication package over NS-3 while performing the computational calculations on a RaspberryPi3 device to mimic the drone calculation process and delays. The performance of the proposed authentication shows a promising reduction in the authentication time and shows lightweight and reliable compatibility.
引用
收藏
页码:57485 / 57498
页数:14
相关论文
共 50 条
  • [41] A Secure User Anonymity-Preserving Biometrics and PUF-Based Multiserver Authentication Scheme With Key Agreement in 5G Networks
    Xu, Deqin
    Bian, Weixin
    Li, Qingde
    Xie, Dong
    Zhao, Jun
    Hu, Yao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5170 - 5184
  • [42] Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks
    Li, Ting
    Zhao, Ming
    Wong, Kelvin Kian Loong
    COMPUTER COMMUNICATIONS, 2020, 152 : 109 - 118
  • [43] Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing
    Wijethilaka, Shalitha
    Yadav, Awaneesh Kumar
    Braeken, An
    Liyanage, Madhusanka
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 3988 - 4005
  • [44] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [45] Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks
    Yazdinejad, Abbas
    Parizi, Reza M.
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1120 - 1132
  • [46] Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks
    Dong, Qi
    Liu, Donggang
    Ning, Peng
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 2 - 12
  • [47] Practical and Secure Password Authentication and Key-Agreement-Scheme-Based Dual Server for IoT Devices in 5G Network
    Zhang, Songsong
    Liu, Yining
    Gao, Tiegang
    Xie, Yong
    Zhou, Chuan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 34639 - 34651
  • [48] A new authentication and key agreement protocol for 5G wireless networks
    Tian Liu
    Fan Wu
    Xiong Li
    Chaoyang Chen
    Telecommunication Systems, 2021, 78 : 317 - 329
  • [49] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):
  • [50] Neuro-Fuzzy Based Handover Authentication Protocol for Ultra Dense 5G Networks
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Abeka, Silvance Onyango
    2020 IEEE 2ND GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (IEEE GPECOM2020), 2020, : 339 - 344