Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

被引:127
|
作者
Ali, Zeeshan [1 ]
Chaudhry, Shehzad Ashraf [2 ]
Ramzan, Muhammad Sher [3 ]
Al-Turjman, Fadi [4 ,5 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[4] Near East Univ, Artificial Intelligence Engn Dept, TR-99138 Nicosia, Turkey
[5] Near East Univ, Res Ctr AI & IoT, TR-99138 Nicosia, Turkey
关键词
Surveillance; security; key-agreement; drones; IoT; IoD; session key leakage; traceability; user anonymity; KEY AGREEMENT SCHEME; USER AUTHENTICATION; POWER ANALYSIS; INTERNET; THINGS; NETWORKS; PROTOCOL; DEVICES; DESIGN;
D O I
10.1109/ACCESS.2020.2977817
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the surveillance data in smart cities using the current cellular networks. However, due to the openness of communication channel and battery operations, the drones and the sensitive data collected through drones are subject to many security threats. To cope the security challenges, recently, Srinivas et al. proposed a temporal credential based anonymous lightweight authentication scheme (TCALAS) for IoD networks. Contrary to the IoD monitoring framework proposed by Srinivas et al., their own scheme can work only when there is one and only one cluster/fiying zone and is not scalable. Moreover, despite their claim of robustness, the investigation in this paper reveals that Srinivas et al.'s scheme cannot resist traceability and stolen verifier attacks. Using the lightweight symmetric key primitives and temporal credentials, an improved scheme (iTCALAS) is then proposed. The proposed scheme while maintaining the lightweightness provides security against many known attacks including traceability and stolen verifier. The proposed iTCALAS extends scalability and can work when there are several fiying zone/clusters in the IoD environment. The formal security proof along with automated verification using ProVerif show robustness of proposed iTCALAS. Moreover, the security discussion and performance comparisons show that the iTCALAS provides the known security features and completes authentication in just 2:295 ms
引用
收藏
页码:43711 / 43724
页数:14
相关论文
共 50 条
  • [31] Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication
    Rathore, M. Mazhar
    Jararweh, Yaser
    Raheel, Muhammad
    Paul, Anand
    2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2019, : 181 - 188
  • [32] Comments on "ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes"
    Yu, Sungjin
    Das, Ashok Kumar
    Park, Youngho
    IEEE ACCESS, 2021, 9 : 49154 - 49159
  • [33] ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes
    Iqbal, Waseem
    Abbas, Haider
    Deng, Pan
    Wan, Jiafu
    Rauf, Bilal
    Abbas, Yawar
    Rashid, Imran
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) : 9622 - 9633
  • [34] Comments on "A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance"
    Liu, Shuangshuang
    Chen, Chien-Ming
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (12) : 25054 - 25058
  • [35] Securing the internet of vehicles through lightweight block ciphers *
    Castiglione, Arcangelo
    Palmieri, Francesco
    Colace, Francesco
    Lombardi, Marco
    Santaniello, Domenico
    D'Aniello, Giuseppe
    PATTERN RECOGNITION LETTERS, 2020, 135 : 264 - 270
  • [36] Securing the Authentication and Message Integrity for Smart Home using Smart Phone
    Mantoro, Teddy
    Ayu, Media A.
    Mahmod, Siti Munawwarah Binti
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 985 - 989
  • [37] Securing Smart Vehicles Through Federated Learning
    Halim, Sadaf M. D.
    Hossain, Md Delwar
    Khan, Latifur
    Singhal, Anoop
    Inoue, Hiroyuki
    Ochiai, Hideya
    Hamlen, Kevin W.
    Kadobayashi, Youki
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 18 - 35
  • [38] A Lightweight Mutual Authentication Protocol for Internet of Vehicles
    Tabany, Myasar
    Syed, Mohiuddin
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (02) : 155 - 163
  • [39] LTSM: Lightweight and Trusted Sharing Mechanism of IoT Data in Smart City
    Liu, Chang
    Guo, Shaoyong
    Guo, Song
    Yan, Yong
    Qiu, Xuesong
    Zhang, Suxiang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07): : 5080 - 5093
  • [40] An Object-based Video Authentication Mechanism for Smart-Living Surveillance
    Zhang, Peng
    Thomas, Tony
    Zhuo, Tao
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ORANGE TECHNOLOGIES (ICOT), 2015, : 173 - 176