BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks

被引:0
|
作者
Huang, Keke [1 ]
Hu, Huidan [2 ,3 ]
Lin, Changlu [2 ,3 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, 350117, Peoples R China
[2] Fujian Normal Univ, Ctr Appl Math Fujian Prov, Sch Math & Stat, Key Lab Analyt Math & Applicat,Minist Educ,Fujian, Fuzhou 350117, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 22期
关键词
Task analysis; Authentication; Security; Autonomous aerial vehicles; Internet of Things; Drones; Costs; Authentication and key agreement (AKA); blockchain; physical unclonable functions (PUFs); real-or-random (ROR) model; unmanned aerial vehicles (UAVs); GROUND STATION; INTERNET; MANAGEMENT; MECHANISM;
D O I
10.1109/JIOT.2024.3431879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs, also known as Drones) have been widely employed in military defense and civilian service. However, as UAVs communicate over insecure open wireless channels, the security challenges and privacy concerns are becoming increasingly prominent. Moreover, some existing schemes to achieve authentication and key agreement (AKA) among UAVs are spliced with the assistance of two UAV-2-GCS mechanisms, which are not flexible enough to be applied in the Internet of Drones (IoD) scenarios. This article proposes a blockchain-assisted AKA scheme for UAVs networks (BAKAS-UAV) referred to as BAKAS-UAV, which addresses security and privacy concerns and overcomes high computational and communication costs in the IoD. A blockchain-based network model is presented in which the ground station acts as an edge node and manages the blockchain, which assists AKA. Based on the network model, both types of AKA mechanisms, UAV-2-GCS and UAV-2-UAV, are proposed, respectively. In particular, the ground control station (GCS) does not participate in the AKA of UAV-2-UAV process; only upon the process is completed the two UAVs synchronize the updated information with GCS. We also implement a smart contract as the authentication service, and the experimental implementation demonstrates the availability of our scheme in IoD. Physical unclonable functions (PUFs) is introduced on the UAVs side to defend against physical capture attacks and also to implement AKA mechanisms. The semantic security is proved formally based on the real-or-random (ROR) model, and the informal analysis shows that the scheme satisfies the demanded security requirements. The scheme's performance is evaluated by simulating the UAVs and GCS settings with Raspberry Pi 4B and MacOS platforms, respectively, with implementation of several cryptographic primitives. The experimental results show that BAKAS-UAV achieves high efficiency.
引用
收藏
页码:36858 / 36883
页数:26
相关论文
共 50 条
  • [1] Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles
    Tan, Yawen
    Wang, Jiadai
    Liu, Jiajia
    Kato, Nei
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 16928 - 16940
  • [2] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Tomar, Ashish
    Tripathi, Sachin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 451 - 468
  • [3] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Ashish Tomar
    Sachin Tripathi
    Cluster Computing, 2022, 25 : 451 - 468
  • [4] LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks
    Yu, Sungjin
    Lee, Joonyoung
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Park, Youngho
    COMPUTER NETWORKS, 2023, 224
  • [5] A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
    Alzahrani, Bander
    Barnawi, Ahmed
    Irshad, Azeem
    Alhothali, Areej
    Alotaibi, Reem
    Shafiq, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 6141 - 6158
  • [6] Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks
    Qureshi, Kashif Naseer
    Sandila, Muhammad Arslan Saleem
    Javed, Ibrahim Tariq
    Margaria, Tiziana
    Aslam, Laeeq
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (01) : 83 - 93
  • [7] An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things
    Olufemi, Olakanmi Oladayo
    Oluwasesan, Odeyemi Kehinde
    INTERNET OF THINGS, 2023, 23
  • [8] Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles
    Shen, Meng
    Lu, Hao
    Wang, Fei
    Liu, Huisen
    Zhu, Liehuang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (11) : 12250 - 12263
  • [9] An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles
    Pan, Xiangyu
    Jin, Yuqiao
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136
  • [10] A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles
    Xu, Zisang
    Li, Xiong
    Xu, Jianbo
    Liang, Wei
    Choo, Kim-Kwang Raymond
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95