SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management

被引:11
作者
Jegadeesan, Subramani [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ]
Vijayakumar, Pandi [5 ]
Azees, Maria [6 ]
机构
[1] M Kumarasamy Coll Engn, Dept Elect & Commun Engn, Karur 639113, India
[2] Indian Inst Technol Dhanbad, Comp Sci & Engn Dept, Dhanbad 826004, Bihar, India
[3] Univ Jordan, King Abdullah II Sch Informat Technol, Amman 11942, Jordan
[4] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[6] GMR Inst Technol, Dept Elect & Commun Engn, Rajam 532127, India
来源
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING | 2022年 / 6卷 / 02期
关键词
Marine vehicles; Artificial intelligence; Trajectory; Security; Privacy; Authentication; Base stations; automatic identification system~(AIS); computational energy; communication energy; energy efficient scheme; marine traffic management; trajectory privacy; PROTOCOL;
D O I
10.1109/TGCN.2021.3126618
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
An automatic identification system (AIS) provides significant improvements in traffic monitoring, collision avoidance, and ship assistance. A unique Maritime Mobile Service Identity (MMSI) is used by the AIS transceiver to identify the specific ship. However, an attacker can easily forge and tamper with unique MMSI. Also, the AIS transceiver sends the traffic information such as latitude, longitude, speed, MMSI, ship type, dimension, navigation status, etc. to the other ships and the base station continuously. This continuous communication of a ship with the base station or other ships may lead to the serious security threat of ship trajectory privacy. To overcome the above-discussed security threats, anonymous authentication with a trajectory privacy-preserving scheme is proposed. The security and performance analysis section ensures that the proposed scheme provides the necessary security features by consuming less computational and communication energy comparing to that of other competing systems.
引用
收藏
页码:815 / 824
页数:10
相关论文
共 29 条
[1]  
2015, International Journal of Science and Research (IJSR), V4, P245, DOI 10.21275/v4i11.nov151099
[2]  
Alincourt E, 2016, OCEANS-IEEE
[3]  
[Anonymous], 2019, CYGWIN
[4]  
Azees M., 2016, AUST J BASIC APPL SC, V10, P171
[5]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[6]  
Balduzzi M., 2014, P 30 ANN COMPUTER SE, V30, P436, DOI [DOI 10.1145/2664243.2664257, 10.1145/2664243.2664257]
[7]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[8]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[9]   Vessels Cybersecurity: Issues, Challenges, and the Road Ahead [J].
Caprolu, Maurantonio ;
Di Pietro, Roberto ;
Raponi, Simone ;
Sciancalepore, Savio ;
Tedeschi, Pietro .
IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (06) :90-96
[10]  
Department of Electrical and Computer Engineering University of Denver Denver USA, 2016, Journal of Traffic and Logistics Engineering, DOI 10.18178/jtle.4.1.1-6