Efficient Authentication of Drones to mmWave Wireless Mesh Networks in Post-Disaster Scenarios

被引:4
作者
Abdel-Malek, Mai A. [1 ]
Akkaya, Kemal [1 ]
Saputro, Nico [2 ]
Ibrahim, Ahmed S. [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] Parahyangan Catholic Univ, Dept Elect Engn, Bandung 40141, Jawa Barat, Indonesia
来源
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2020年
基金
美国国家科学基金会;
关键词
Authentication; drones; millimeter wave; mesh network; proxy-signature;
D O I
10.1109/GLOBECOM42002.2020.9322282
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unmanned Aerial Vehicles (UAVs), or drones, are increasingly being utilized for public safety circumstances including post-disaster recovery of destroyed communication infrastructure. For instance, drones are temporarily positioned within an affected area to create a wireless mesh network among public safety personnel. To serve the need for high-rate video-based damage assessment, drone-assisted communication can utilize high-bandwidth millimeter wave (mmWave) technologies such as IEEE 802.11ad. However, short-range mmWave communication makes it hard for optimally-positioned drones to be authenticated with a centralized network control center. Therefore and assuming that there are potential imposters, we propose two lightweight and fast authentication mechanisms that take into account the physical limitations of mmWave communication. First, we propose a drone-to-drone authentication mechanism, which is based on proxy signatures from a control center. Accordingly, any newly joining drone can authenticate itself to an exist one rather than attempting to authenticate to the out-of-reach control center. Second, we propose a drone-to-ground authentication mechanism, to enable each drone to authenticate itself to its associated ground users. Such authentication approach is based on challenge-response broadcast type, and it is still utilizing fast proxy signature approach. The evaluation of the proposed authentication mechanisms, conducted using NS-3 implementation of IEEE 802.11ad protocol, show their efficiency and practicality.
引用
收藏
页数:6
相关论文
共 18 条
[1]   UAV positioning for out-of-band integrated access and backhaul millimeter wave network [J].
Abdel-Malek, Mai A. ;
Ibrahim, Ahmed S. ;
Mokhtar, Mohamed ;
Akkaya, Kemal .
PHYSICAL COMMUNICATION, 2019, 35
[2]  
[Anonymous], 2001, P S CRYPT INF SEC SC
[3]  
[Anonymous], 2016, NS 3 NETW SIM 3 REL
[4]  
Assasa H., 2016, P 2016 WORKSHOP NS 3, P57
[5]   A survey of intelligent vehicle applications worldwide [J].
Bishop, R .
PROCEEDINGS OF THE IEEE INTELLIGENT VEHICLES SYMPOSIUM 2000, 2000, :25-30
[6]  
Braunstein B., 2006, P 3 INT ISCRAM C, P30
[7]  
Das M. L., 2006, CS0612098 ARXIV
[8]  
Karimibiuki M, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P329, DOI 10.1109/UEMCON47517.2019.8992931
[9]   A new delegation-based authentication protocol for use in portable communication systems [J].
Lee, WB ;
Yeh, CK .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2005, 4 (01) :57-64
[10]  
Liu W., 2018, WIRELESS COMMUNICATI, V2018