BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks

被引:0
|
作者
Huang, Keke [1 ]
Hu, Huidan [2 ,3 ]
Lin, Changlu [2 ,3 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, 350117, Peoples R China
[2] Fujian Normal Univ, Ctr Appl Math Fujian Prov, Sch Math & Stat, Key Lab Analyt Math & Applicat,Minist Educ,Fujian, Fuzhou 350117, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 22期
关键词
Task analysis; Authentication; Security; Autonomous aerial vehicles; Internet of Things; Drones; Costs; Authentication and key agreement (AKA); blockchain; physical unclonable functions (PUFs); real-or-random (ROR) model; unmanned aerial vehicles (UAVs); GROUND STATION; INTERNET; MANAGEMENT; MECHANISM;
D O I
10.1109/JIOT.2024.3431879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs, also known as Drones) have been widely employed in military defense and civilian service. However, as UAVs communicate over insecure open wireless channels, the security challenges and privacy concerns are becoming increasingly prominent. Moreover, some existing schemes to achieve authentication and key agreement (AKA) among UAVs are spliced with the assistance of two UAV-2-GCS mechanisms, which are not flexible enough to be applied in the Internet of Drones (IoD) scenarios. This article proposes a blockchain-assisted AKA scheme for UAVs networks (BAKAS-UAV) referred to as BAKAS-UAV, which addresses security and privacy concerns and overcomes high computational and communication costs in the IoD. A blockchain-based network model is presented in which the ground station acts as an edge node and manages the blockchain, which assists AKA. Based on the network model, both types of AKA mechanisms, UAV-2-GCS and UAV-2-UAV, are proposed, respectively. In particular, the ground control station (GCS) does not participate in the AKA of UAV-2-UAV process; only upon the process is completed the two UAVs synchronize the updated information with GCS. We also implement a smart contract as the authentication service, and the experimental implementation demonstrates the availability of our scheme in IoD. Physical unclonable functions (PUFs) is introduced on the UAVs side to defend against physical capture attacks and also to implement AKA mechanisms. The semantic security is proved formally based on the real-or-random (ROR) model, and the informal analysis shows that the scheme satisfies the demanded security requirements. The scheme's performance is evaluated by simulating the UAVs and GCS settings with Raspberry Pi 4B and MacOS platforms, respectively, with implementation of several cryptographic primitives. The experimental results show that BAKAS-UAV achieves high efficiency.
引用
收藏
页码:36858 / 36883
页数:26
相关论文
共 50 条
  • [41] Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks"
    Jiang, Junjie
    Susilo, Willy
    Baek, Joonsang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3006 - 3007
  • [42] A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services
    Mir, Omid
    Nikooghadam, Morteza
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (04) : 2439 - 2461
  • [43] A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services
    Omid Mir
    Morteza Nikooghadam
    Wireless Personal Communications, 2015, 83 : 2439 - 2461
  • [44] A Secure Temporal-Credential-based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks
    He, Debiao
    Kumar, Neeraj
    Chilamkurti, Naveen
    2013 INTERNATIONAL SYMPOSIUM ON WIRELESS AND PERVASIVE COMPUTING (ISWPC), 2013,
  • [45] A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
    Ali, Rifaqat
    Pal, Arup Kumar
    Kumari, Saru
    Karuppiah, Marimuthu
    Conti, Mauro
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 200 - 215
  • [46] Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks
    Gope, Prosanta
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 160 - 167
  • [47] Ultra-Lightweight and Secure Blockchain-Assisted Charging Scheduling Scheme for Vehicular Edge Networks by Utilization of NanoPi NEO
    Shahidinejad, Ali
    Abbasinezhad-Mood, Dariush
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (08) : 8116 - 8123
  • [48] CAKA: Certificateless Authenticated Key Agreement Scheme for Satellite-assisted Unmanned-aerial-vehicle Network
    Mu, Jian
    Zhang, Xiaoyu
    Zhao, Renmin
    Wang, Qiong
    Jing, Pujie
    Feng, Xia
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 28 - 34
  • [49] Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing
    Heo, Gabin
    Chae, Kijoon
    Doh, Inshil
    IEEE Access, 2022, 10 : 27990 - 28003
  • [50] Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing
    Heo, Gabin
    Chae, Kijoon
    Doh, Inshil
    IEEE ACCESS, 2022, 10 : 27990 - 28003