A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks

被引:12
|
作者
Abdel-Malek, Mai A. [1 ,3 ]
Akkaya, Kemal [1 ]
Bhuyan, Arupjyoti [2 ]
Ibrahim, Ahmed S. [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] INL Wireless Secur Inst, Idaho Natl Lab, Idaho Falls, ID 83415 USA
[3] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Drones; Authentication; Device-to-device communication; 5G mobile communication; Security; Standards; Protocols; 5G security; authentication; D2D; drones; delegation; proxy signature; COMMUNICATION; SCHEME; INTERNET; BLOCKCHAIN; PROTOCOL;
D O I
10.1109/ACCESS.2022.3178121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones are imperative for the 5G architecture as a mobile source to expand network coverage and support seamless services, particularly through enabling device-to-device (D2D) communication. Such deployment of drones in D2D settings raises various security threats in drone communication. While the existing D2D communication security standard within the 4G cellular architecture may address some of these issues, the standard includes heavy traffic toward the network core servers. If this security standard is to be adopted in the 5G D2D security services with the same traffic load, it may negatively impact the 5G network performance. Therefore, this paper proposes a lightweight proxy signature-based authentication mechanism for a swarm of drones compatible with the 5G D2D standard mechanisms. This paper proposes a distributed delegation-based authentication mechanism to reduce the traffic overhead toward the 5G core network. In this scheme, the legitimate drones are authorized as proxy delegated signers to perform authentication on behalf of the core network. Furthermore, we propose a mechanism to elect and relocate a new leader relay drone from the existing drone swarm. We implemented the proposed authentication algorithm in the 5G D2D-based communication package over NS-3 while performing the computational calculations on a RaspberryPi3 device to mimic the drone calculation process and delays. The performance of the proposed authentication shows a promising reduction in the authentication time and shows lightweight and reliable compatibility.
引用
收藏
页码:57485 / 57498
页数:14
相关论文
共 50 条
  • [1] A Proxy Signature-Based Drone Authentication in 5G D2D Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [2] A proxy signature-based handover authentication scheme for LTE wireless networks
    Qiu, Yue
    Ma, Maode
    Wang, Xilei
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 83 : 63 - 71
  • [3] Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks
    Alladi, Tejasvi
    Venkatesh, Vishnu
    Chamola, Vinay
    Chaturvedi, Nitin
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [4] Towards an Aggregate Signature-based Authentication for Opportunistic Networks
    Avoussoukpo, Cossi Blaise
    Xu, Chunxiang
    Tchenagnon, Marius
    Eltayieb, Nabeil
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
  • [5] Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
    Jan, Saeed Ullah
    Khan, Habib Ullah
    IEEE ACCESS, 2021, 9 : 130247 - 130263
  • [6] Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
    Jan, Saeed Ullah
    Khan, Habib Ullah
    IEEE Access, 2021, 9 : 130247 - 130263
  • [7] Accelerating signature-based broadcast authentication for wireless sensor networks
    Fan, Xinxin
    Gong, Guang
    AD HOC NETWORKS, 2012, 10 (04) : 723 - 736
  • [8] Feature Selection Based on IoT Aware QDA Node Authentication in 5G Networks
    Haripriya, M. P.
    Venkadesh, P.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (02): : 825 - 836
  • [9] Blockchain-based Authentication for 5G Networks
    Haddad, Zaher
    Fouda, Mostafa M.
    Mahmoud, Mohamed
    Abdallah, Mohamed
    2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, 2020, : 189 - 194
  • [10] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)