A smart lightweight privacy preservation scheme for IoT-based UAV communication systems

被引:48
|
作者
Deebak, B. D. [1 ]
Al-Turjman, Fadi [2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Near East Univ, Res Ctr AI & IoT, Artificial Intelligence Dept, Mersin 10, Nicosia, Turkey
关键词
Unmanned aerial vehicle; Internet of drone; Authentication; Session-key agreement; Privacy-preserving; KEY AGREEMENT SCHEME; UNMANNED AERIAL VEHICLES; AUTHENTICATION; INTERNET; SECURITY; THINGS; FRAMEWORK; NETWORKS; SURVEILLANCE; DESIGN;
D O I
10.1016/j.comcom.2020.08.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicle (UAV) has extensively been practiced in the military and civilian surveillance systems that access sensitive data over the cellular networks. However, channel insecurity and battery limitation may not protect the aerial coverage area. Thus, sensitive information gathered through aerial vehicles causes security threats. To manage the security issues, Smart Internet of Drone (S-IoD) have been evolved to use Intelligent Personal Assistant (IPA) as a software agent while monitoring and observing areas of interest. The current state-of-the-art technologies provide ubiquitous communication to enable several Internet of Things (IoT) paradigms. It achieves a feature of a decision support system that allows the smart interaction and communication between real-time entities. IPA offers smart interaction with other smart real-time entities to gain the user's knowledge and awareness. This paper presents an S-IoD framework for a UAV environment that independently collects sensible information. In order to reduce the computation cost of the authentication protocol, a lightweight privacy-preserving scheme (L-PPS) is introduced. The proposed L-PPS is constructive to provide the robustness between the IoT devices with a valid authentication period. To demonstrate the security and performance efficiencies, the formal verification was performed using a verification tool, Scyther, and a random oracle model. In addition, the proposed L-PPS introduces a secret token and dynamic user authentication to speed up the authentication process between the communication entities. Importantly, the authentication session of L-PPS does not use any complex cryptographic operations, whereby it has less computation and communication costs to meet the standard constraints of surveillance systems. Moreover, the obtained simulation analysis proves that the proposed L-PPS achieves better quality metrics than other authentication schemes in the literature.
引用
收藏
页码:102 / 117
页数:16
相关论文
共 50 条
  • [21] Toward Secured IoT-Based Smart Systems Using Machine Learning
    Abdalzaher, Mohamed S. S.
    Fouda, Mostafa M. M.
    Elsayed, Hussein A. A.
    Salim, Mahmoud M. M.
    IEEE ACCESS, 2023, 11 : 20827 - 20841
  • [22] A survey on communication components for IoT-based technologies in smart homes
    Zaidan, A. A.
    Zaidan, B. B.
    Qahtan, M. Y.
    Albahri, O. S.
    Albahri, A. S.
    Alaa, Mussab
    Jumaah, F. M.
    Talal, Mohammed
    Tan, K. L.
    Shir, W. L.
    Lim, C. K.
    TELECOMMUNICATION SYSTEMS, 2018, 69 (01) : 1 - 25
  • [23] An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions
    Attarian, Reyhane
    Hashemi, Sattar
    COMPUTER NETWORKS, 2021, 190
  • [24] Smart Secure Sensing for IoT-Based Agriculture: Blockchain Perspective
    Vangala, Anusha
    Das, Ashok Kumar
    Kumar, Neeraj
    Alazab, Mamoun
    IEEE SENSORS JOURNAL, 2021, 21 (16) : 17591 - 17607
  • [25] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Esfahani, Maryam Nasr
    Ghahfarokhi, Behrouz Shahgholi
    Borujeni, Shahram Etemadi
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (02) : 2067 - 2127
  • [26] An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
    Deebak, B. D.
    Al-Turjman, Fadi
    Aloqaily, Moayad
    Alfandi, Omar
    IEEE ACCESS, 2019, 7 : 135632 - 135649
  • [27] Lightweight IoT-based authentication scheme in cloud computing circumstance
    Zhou, Lu
    Li, Xiong
    Yeh, Kuo-Hui
    Su, Chunhua
    Chiu, Wayne
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 244 - 251
  • [28] Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare
    Masud, Mehedi
    Gaba, Gurjot Singh
    Choudhary, Karanjeet
    Hossain, M. Shamim
    Alhamid, Mohammed F.
    Muhammad, Ghulam
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2649 - 2656
  • [29] SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems
    Mbarek, Bacem
    Buhnova, Barbora
    Pitner, Tomas
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1373 - 1378
  • [30] Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare
    Zhou, Xin
    Wang, Shengbao
    Wen, Kang
    Hu, Bin
    Tan, Xiao
    Xie, Qi
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 9599 - 9609