A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks

被引:12
|
作者
Abdel-Malek, Mai A. [1 ,3 ]
Akkaya, Kemal [1 ]
Bhuyan, Arupjyoti [2 ]
Ibrahim, Ahmed S. [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] INL Wireless Secur Inst, Idaho Natl Lab, Idaho Falls, ID 83415 USA
[3] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Drones; Authentication; Device-to-device communication; 5G mobile communication; Security; Standards; Protocols; 5G security; authentication; D2D; drones; delegation; proxy signature; COMMUNICATION; SCHEME; INTERNET; BLOCKCHAIN; PROTOCOL;
D O I
10.1109/ACCESS.2022.3178121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones are imperative for the 5G architecture as a mobile source to expand network coverage and support seamless services, particularly through enabling device-to-device (D2D) communication. Such deployment of drones in D2D settings raises various security threats in drone communication. While the existing D2D communication security standard within the 4G cellular architecture may address some of these issues, the standard includes heavy traffic toward the network core servers. If this security standard is to be adopted in the 5G D2D security services with the same traffic load, it may negatively impact the 5G network performance. Therefore, this paper proposes a lightweight proxy signature-based authentication mechanism for a swarm of drones compatible with the 5G D2D standard mechanisms. This paper proposes a distributed delegation-based authentication mechanism to reduce the traffic overhead toward the 5G core network. In this scheme, the legitimate drones are authorized as proxy delegated signers to perform authentication on behalf of the core network. Furthermore, we propose a mechanism to elect and relocate a new leader relay drone from the existing drone swarm. We implemented the proposed authentication algorithm in the 5G D2D-based communication package over NS-3 while performing the computational calculations on a RaspberryPi3 device to mimic the drone calculation process and delays. The performance of the proposed authentication shows a promising reduction in the authentication time and shows lightweight and reliable compatibility.
引用
收藏
页码:57485 / 57498
页数:14
相关论文
共 50 条
  • [21] Token-Based Authentication Framework for 5G MEC Mobile Networks
    Niewolski, Wojciech
    Nowak, Tomasz W.
    Sepczuk, Mariusz
    Kotulski, Zbigniew
    ELECTRONICS, 2021, 10 (14)
  • [22] Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks
    Zhang, Jing
    Cui, Jie
    Zhong, Hong
    Bolodurina, Irina
    Liu, Lu
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04): : 2982 - 2994
  • [23] Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks
    Thumbur, Gowri
    Rao, G. Srinivasa
    Reddy, P. Vasudeva
    Gayathri, N. B.
    Reddy, D. V. R. Koti
    Padmavathamma, M.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1908 - 1920
  • [24] RAT Selection Based on Association Probability in 5G Heterogeneous Networks
    Soleymani, Behrad
    Zamani, Amirreza
    Rastegar, Seyed Hamed
    Shah-Mansouri, Vahid
    2017 IEEE SYMPOSIUM ON COMMUNICATIONS AND VEHICULAR TECHNOLOGY (SCVT), 2017,
  • [25] General Multimedia Trust Authentication Framework for 5G Networks
    Xing, Ling
    Ma, Qiang
    Wu, Honghai
    Xie, Ping
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [26] A Fault Tolerant Mechanism for UE Authentication in 5G Networks
    Leu, Fang-Yie
    Tsai, Kun-Lin
    Susanto, Heru
    Gu, Cheng-Yan
    You, Ilsun
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1650 - 1667
  • [27] A Fault Tolerant Mechanism for UE Authentication in 5G Networks
    Fang-Yie Leu
    Kun-Lin Tsai
    Heru Susanto
    Cheng-Yan Gu
    Ilsun You
    Mobile Networks and Applications, 2021, 26 : 1650 - 1667
  • [28] Blockchain-Based Decentralized Authentication for Information-Centric 5G Networks
    Hassan, Muhammad
    Pesavento, Davide
    Benmohamed, Lotfi
    PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 299 - 302
  • [29] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [30] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    EURASIP Journal on Wireless Communications and Networking, 2020