Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones

被引:101
作者
Tian, Yifan [1 ]
Yuan, Jiawei [1 ]
Song, Houbing [1 ]
机构
[1] Embry Riddle Aeronaut Univ, Dept ECSSE, Daytona Beach, FL 32114 USA
关键词
Internet of Drones; UAVs; Authentication; Internet of things; SECURE; PROTOCOL; SYSTEMS;
D O I
10.1016/j.jisa.2019.06.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, small-scale unmanned aerial vehicles (UAVs), or drones, have demonstrated their promising capabilities in supporting a range of applications, such as surveillance, inspection, package delivery, precision agriculture, etc. Given an increasing number of UAVs in the low-altitude airspace, connecting UAVs to form the Internet of Drones (IoDs) is a promising trend to enhance the flying safety as well as the service quality of UAVs. However, due to the open-access communication environment, IoD also raises security and privacy concerns, including authentication threat as well as the leakage of identity, location, and flying routes. In order to address the security and privacy concerns in IoD, this paper proposes an efficient privacy-preserving authentication framework. By utilizing the lightweight online/offline signature design, our framework assures the authentication efficiency when deploying on resource-constrained small-scale UAVs. Considering the high mobility of UAVs, a predictive authentication approach is investigated with mobile edge computing (MEC) in our framework to further reduce the authentication cost for potential authentication activities. Meanwhile, by designing a buffer pseudonym and public key update strategy, our framework enables the protection of privacy in terms of UAVs' identity, location, and flying routes. Thorough analysis is carried out to demonstrate the fulfillment and feasibility of our framework in terms of security, privacy, and efficiency. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 34 条
  • [1] [Anonymous], 2011, PROC 17 ANN INT C MO
  • [2] [Anonymous], IEEE T NANOTECHNOLOG
  • [3] Bhaskaranand M, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P1633, DOI 10.1109/MILCOM.2011.6127543
  • [4] Choi J.Y., 2005, The 1st ACM international workshop on Quality of service security in wireless and mobile networks, P79
  • [5] Even S, 1996, J CRYPTOL, V9, P35, DOI 10.1007/BF02254791
  • [6] Internet of Drones
    Gharibi, Mirmojtaba
    Boutaba, Raouf
    Waslander, Steven L.
    [J]. IEEE ACCESS, 2016, 4 : 1148 - 1162
  • [7] Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication
    Gope, Prosanta
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) : 3953 - 3962
  • [8] Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
    Gope, Prosanta
    Lee, Jemin
    Quek, Tony Q. S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) : 2831 - 2843
  • [9] Survey of Important Issues in UAV Communication Networks
    Gupta, Lav
    Jain, Raj
    Vaszkun, Gabor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1123 - 1152
  • [10] Privacy-friendly and efficient secure communication framework for V2G networks
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    [J]. IET COMMUNICATIONS, 2018, 12 (03) : 304 - 309