Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

被引:127
|
作者
Ali, Zeeshan [1 ]
Chaudhry, Shehzad Ashraf [2 ]
Ramzan, Muhammad Sher [3 ]
Al-Turjman, Fadi [4 ,5 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[4] Near East Univ, Artificial Intelligence Engn Dept, TR-99138 Nicosia, Turkey
[5] Near East Univ, Res Ctr AI & IoT, TR-99138 Nicosia, Turkey
关键词
Surveillance; security; key-agreement; drones; IoT; IoD; session key leakage; traceability; user anonymity; KEY AGREEMENT SCHEME; USER AUTHENTICATION; POWER ANALYSIS; INTERNET; THINGS; NETWORKS; PROTOCOL; DEVICES; DESIGN;
D O I
10.1109/ACCESS.2020.2977817
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the surveillance data in smart cities using the current cellular networks. However, due to the openness of communication channel and battery operations, the drones and the sensitive data collected through drones are subject to many security threats. To cope the security challenges, recently, Srinivas et al. proposed a temporal credential based anonymous lightweight authentication scheme (TCALAS) for IoD networks. Contrary to the IoD monitoring framework proposed by Srinivas et al., their own scheme can work only when there is one and only one cluster/fiying zone and is not scalable. Moreover, despite their claim of robustness, the investigation in this paper reveals that Srinivas et al.'s scheme cannot resist traceability and stolen verifier attacks. Using the lightweight symmetric key primitives and temporal credentials, an improved scheme (iTCALAS) is then proposed. The proposed scheme while maintaining the lightweightness provides security against many known attacks including traceability and stolen verifier. The proposed iTCALAS extends scalability and can work when there are several fiying zone/clusters in the IoD environment. The formal security proof along with automated verification using ProVerif show robustness of proposed iTCALAS. Moreover, the security discussion and performance comparisons show that the iTCALAS provides the known security features and completes authentication in just 2:295 ms
引用
收藏
页码:43711 / 43724
页数:14
相关论文
共 50 条
  • [41] HUMAN-INDUCTIVELY POWERED LIGHTWEIGHT ELECTRIC VEHICLES: SUSTAINABLE TRANSPORTATION FOR THE SMART CITY
    Lisboa Cardoso, L. A.
    Nogueiras Melendez, A. A.
    Martins, Luis A. S. B.
    Afonso, Joao. L.
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ENERGY & ENVIRONMENT (ICEE 2019): BRINGING TOGETHER ENGINEERING AND ECONOMICS, 2019, : 185 - 190
  • [42] Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks
    Qureshi, Kashif Naseer
    Sandila, Muhammad Arslan Saleem
    Javed, Ibrahim Tariq
    Margaria, Tiziana
    Aslam, Laeeq
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (01) : 83 - 93
  • [43] Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City
    Othman, Wajdy
    Miao Fuyou
    Xue, Kaiping
    Hawbani, Ammar
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (12) : 12902 - 12917
  • [44] An Efficient Lightweight Authentication Scheme for Smart Meter
    Du, Jingqi
    Dai, Chengjing
    Mao, Pinshang
    Dong, Wenlong
    Wang, Xiujun
    Li, Zhongwei
    MATHEMATICS, 2024, 12 (08)
  • [45] A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities
    Kamil, Ismaila Adeniyi
    Ogundoyin, Sunday Oyinlola
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [46] Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme
    Das, Sangjukta
    Namasudra, Suyel
    Deb, Suman
    Moreno Ger, Pablo
    Gonzalez Crespo, Ruben
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) : 18486 - 18494
  • [47] Reliability of Surveillance Mission with Unmanned Aerial Vehicles
    Ng, K. M.
    Jiang, J.
    Peng, R.
    Poh, K. L.
    Teo, K. M.
    2011 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2011, : 1554 - 1557
  • [48] Radar Surveillance of Unmanned Aerial Vehicles (Review)
    Riabukha V.P.
    Radioelectronics and Communications Systems, 2020, 63 (11): : 561 - 573
  • [49] Surveillance of Uneven Surface with Unmanned Aerial Vehicles
    Saha, Dibakar
    Pattanayak, Debasish
    Mandal, Partha Sarathi
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2020), 2020,
  • [50] A lightweight authentication mechanism in MIP networks
    Kim, Green
    Kim, Youngse
    Heo, Ung
    Kim, Keecheon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4272 - 4284