An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones

被引:93
作者
Gope, Prosanta [1 ]
Sikdar, Biplab [2 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield S10 2TG, S Yorkshire, England
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 119077, Singapore
基金
新加坡国家研究基金会;
关键词
Drones; Authentication; Privacy; Protocols; Computational modeling; Internet of drones; mutual authentication; double puf; computational efficiency; unmanned aerial vehicles; SECURE;
D O I
10.1109/TVT.2020.3018778
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There has been a a significant increase in the popularity of using Unmanned Aerial Vehicles (UAVs), popularly known as drones, in several applications. In many application scenarios, UAVs are deployed in missions where sensitive data is collected, such as monitoring critical infrastructure, industrial facilities, crops, and public safety. Due to the sensitive and/or safety critical nature of the data collected in these applications, it is imperative to consider the security, and privacy aspects of the UAVs used in these scenarios. In this article, we propose an efficient privacy aware authenticated key agreement scheme for edge-assisted UAVs (Internet of Drones). Unlike the existing security solutions for UAVs, the proposed scheme does not need to store any secret keys in the devices but still can provide the desired security features. To the best of our knowledge, this is the first work where physical security of the UAV has been taken into account. The proposed system allows third-party communication, and mobile edge computing service providers to authenticate the UAVs without any loss of provacy, and outperforms existing methods in terms of computational complexity.
引用
收藏
页码:13621 / 13630
页数:10
相关论文
共 24 条
[1]  
[Anonymous], Amazon Prime Air
[2]  
Bhaskaranand M, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P1633, DOI 10.1109/MILCOM.2011.6127543
[3]  
Cho G., 2020, APPL SCI, V10, P1
[4]   Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Verbauwhede, Ingrid ;
Hiller, Matthias ;
Yu, Meng-Day .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :412-431
[5]  
Federal Aviation Administration, FAA AER FOR 2016 203
[7]   Anonymous Communications for Secure Device-to-Device Aided Fog Computing [J].
Gope, Prosanta ;
Lee, Jemin ;
Hsu, Ruei-Hau ;
Quek, Tony Q. S. .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (03) :10-16
[8]   Survey of Important Issues in UAV Communication Networks [J].
Gupta, Lav ;
Jain, Raj ;
Vaszkun, Gabor .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1123-1152
[9]  
Koubâa A, 2017, IEEE INT CONF AUTON, P329, DOI 10.1109/ICARSC.2017.7964096
[10]   Security and Privacy for the Internet of Drones: Challenges and Solutions [J].
Lin, Chao ;
He, Debiao ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
Vinel, Alexey ;
Huang, Xinyi .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) :64-69