A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance

被引:42
作者
Akram, Muhammad Wahid [1 ]
Bashir, Ali Kashif [2 ]
Shamshad, Salman [1 ]
Saleem, Muhammad Asad [1 ]
AlZubi, Ahmad Ali [3 ]
Chaudhry, Shehzad Ashraf [4 ]
Alzahrani, Bander A. [5 ]
Bin Zikria, Yousaf [6 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[2] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[3] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh 11437, Saudi Arabia
[4] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, Istanbul, Turkey
[5] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
[6] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
Protocols; Security; Drones; Cryptography; Authentication; Vehicular ad hoc networks; Privacy; Authentication protocol; Internet of Drones; VANET; intelligent transportation systems; mutual authentication; information security; KEY AGREEMENT SCHEME; USER AUTHENTICATION; INTERNET; IOT; MECHANISM;
D O I
10.1109/TITS.2021.3129913
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay node's role among the disconnected segments in the road. In this scenario, the communication is done between Vehicles to UAVs (V2U), subsequently transforming into a UAV-assisted VANET. UAV-assisted VANET allows users to access real-time data, especially the monitoring data in smart cities using current mobile networks. Nevertheless, due to the open nature of communication infrastructure, the high mobility of vehicles along with the security and privacy constraints are the significant concerns of UAV-assisted VANET. In these scenarios, Deep Learning Algorithms (DLA) could play an effective role in the security, privacy, and routing issues of UAV-assisted VANET. Keeping this in mind, we have devised a DLA-based key-exchange protocol for UAV-assisted VANET. The proposed protocol extends the scalability and uses secure bitwise XOR operations, one-way hash functions, including user's biometric verification when users and drones are mutually authenticated. The proposed protocol can resist many well-known security attacks and provides formal and informal security under the Random Oracle Model (ROM). The security comparison shows that the proposed protocol outperforms the security performance in terms of running time cost and communication cost and has effective security features compared to other related protocols.
引用
收藏
页码:19634 / 19643
页数:10
相关论文
共 34 条
[1]   Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications [J].
Ahuja, Sanjay P. ;
Wheeler, Nathan .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (01) :1-10
[2]   IoT transaction processing through cooperative concurrency control on fog-cloud computing environment [J].
Al-Qerem, Ahmad ;
Alauthman, Mohammad ;
Almomani, Ammar ;
Gupta, B. B. .
SOFT COMPUTING, 2020, 24 (08) :5695-5711
[3]   A robust authentication and access control protocol for securing wireless healthcare sensor networks [J].
Ali, Zeeshan ;
Ghani, Anwar ;
Khan, Imran ;
Chaudhry, Shehzad Ashraf ;
Islam, S. K. Hafizul ;
Giri, Debasis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[4]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[5]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[6]   A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE [J].
Arul, Rajakumar ;
Raja, Gunasekaran ;
Bashir, Ali Kashif ;
Chaudry, Junaid ;
Ali, Amjad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2677-2689
[7]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[8]   Compound Rank-k Projections for Bilinear Analysis [J].
Chang, Xiaojun ;
Nie, Feiping ;
Wang, Sen ;
Yang, Yi ;
Zhou, Xiaofang ;
Zhang, Chengqi .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2016, 27 (07) :1502-1513
[9]   PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Kumar, Neeraj ;
Alsharif, Mohammed H. .
IEEE SYSTEMS JOURNAL, 2022, 16 (01) :309-316