An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks

被引:45
作者
Khan, Muhammad Asghar [1 ,2 ]
Ullah, Insaf [2 ]
Kumar, Neeraj [3 ,4 ,5 ]
Oubbati, Omar Sami [6 ]
Qureshi, Ijaz Mansoor [7 ]
Noor, Fazal [8 ]
Khanzada, Fahim Ullah [9 ]
机构
[1] ISRA Univ, Islamabad 44000, Pakistan
[2] Hamdard Inst Engn & Technol, Islamabad 44000, Pakistan
[3] Thapar Inst Engn & Technol, CSED, Patiala 147001, Punjab, India
[4] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun, Uttarakhand, India
[5] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[6] Univ Laghouat, Elect Dept, Laghouat 03000, Algeria
[7] Air Univ, Elect Engn Dept, Islamabad 44000, Pakistan
[8] Islamic Univ Madinah, Fac Comp Sci & Informat Syst, Medina, Saudi Arabia
[9] Descon Engn Ltd, Lahore 54760, Pakistan
关键词
Drones; Security; Ad hoc networks; Authentication; Media Access Protocol; Electronic mail; Wireless communication; Flying ad-hoc networks (FANETs); drones; security; access control; key-agreement; AVISPA; USER AUTHENTICATION; INTERNET; PROTOCOL;
D O I
10.1109/TVT.2021.3055895
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the Quality of Service (QoS) in the multi-hop networking schema, FANETs utilize the available resources efficiently. However, due to open wireless boundary and high mobility of the drones, the FANETs are vulnerable to malicious nodes that can penetrate the network and, thus, pose serious security threats, particularly at the Medium Access Control (MAC) layer. Such susceptibility compromises the network security and privacy and harms the information exchange operation within the network. The attacker can either transmit a large number of reservation requests to waste the bandwidth, listen to the control messages, conduct power-efficient jamming or falsify the information to manipulate the network control. Therefore, secure access control and a key agreement mechanism are required. The mechanism must utilize the two phases, i.e., node authentication and key agreement, to counter the aforementioned attacks. Our contribution, in this paper, is a certificate-based access control and key agreement scheme, which is based on the technique of Hyperelliptic Curve Cryptography (HECC) and employs a collision-resistant one-way cryptographic hash function. In order to assess the viability and performance of the proposed scheme, we analyze it using formal security analysis techniques, such as the Real-Or-Random (ROR) model and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The scheme is also evaluated using the informal security analysis technique, or the non-mathematical approach. The results obtained from both analyses affirm the superiority of our proposed scheme.
引用
收藏
页码:4839 / 4851
页数:13
相关论文
共 59 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   UAV assistance paradigm: State-of-the-art in applications and challenges [J].
Alzahrani, Bander ;
Oubbati, Omar Sami ;
Barnawi, Ahmed ;
Atiquzzaman, Mohammed ;
Alghazzawi, Daniyal .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 166
[3]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[4]  
[Anonymous], 2003, P USENIX SEC S AUG
[5]  
Arnosti SZ, 2017, INT CONF UNMAN AIRCR, P1368
[6]  
AVISPA, 2019, AVISPA AUTOMATED VAL
[7]   Flying Ad-Hoc Networks (FANETs): A survey [J].
Bekmezci, Ilker ;
Sahingoz, Ozgur Koray ;
Temel, Samil .
AD HOC NETWORKS, 2013, 11 (03) :1254-1270
[8]   Wireless sensor network denial of sleep attack [J].
Brownfield, M ;
Gupta, Y ;
Davis, N .
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, :356-364
[9]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[10]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043