A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks

被引:12
|
作者
Abdel-Malek, Mai A. [1 ,3 ]
Akkaya, Kemal [1 ]
Bhuyan, Arupjyoti [2 ]
Ibrahim, Ahmed S. [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] INL Wireless Secur Inst, Idaho Natl Lab, Idaho Falls, ID 83415 USA
[3] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Drones; Authentication; Device-to-device communication; 5G mobile communication; Security; Standards; Protocols; 5G security; authentication; D2D; drones; delegation; proxy signature; COMMUNICATION; SCHEME; INTERNET; BLOCKCHAIN; PROTOCOL;
D O I
10.1109/ACCESS.2022.3178121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones are imperative for the 5G architecture as a mobile source to expand network coverage and support seamless services, particularly through enabling device-to-device (D2D) communication. Such deployment of drones in D2D settings raises various security threats in drone communication. While the existing D2D communication security standard within the 4G cellular architecture may address some of these issues, the standard includes heavy traffic toward the network core servers. If this security standard is to be adopted in the 5G D2D security services with the same traffic load, it may negatively impact the 5G network performance. Therefore, this paper proposes a lightweight proxy signature-based authentication mechanism for a swarm of drones compatible with the 5G D2D standard mechanisms. This paper proposes a distributed delegation-based authentication mechanism to reduce the traffic overhead toward the 5G core network. In this scheme, the legitimate drones are authorized as proxy delegated signers to perform authentication on behalf of the core network. Furthermore, we propose a mechanism to elect and relocate a new leader relay drone from the existing drone swarm. We implemented the proposed authentication algorithm in the 5G D2D-based communication package over NS-3 while performing the computational calculations on a RaspberryPi3 device to mimic the drone calculation process and delays. The performance of the proposed authentication shows a promising reduction in the authentication time and shows lightweight and reliable compatibility.
引用
收藏
页码:57485 / 57498
页数:14
相关论文
共 50 条
  • [31] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful J.
    Ali, Borhanuddin M.
    Jamalipour, Abbas
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [32] Threats to 5G Group-based Authentication
    Giustolisi, Rosario
    Gehrmann, Christian
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 360 - 367
  • [33] A Network Selection Algorithm for supporting Drone Services in 5G Network Architectures
    Skondras, Emmanouil
    Zoumi, Eirini
    Michalas, Angelos
    Vergados, Dimitrios D.
    2019 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2019,
  • [34] Secure and effective authentication for 5G networks (SEA-5G) using blockchain
    R. Bala
    R. Manoharan
    Journal of Ambient Intelligence and Humanized Computing, 2025, 16 (1) : 51 - 66
  • [35] Cryptanalysis of an Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks
    Yang, Xiaodong
    Chen, Aijia
    Wang, Zhisong
    Du, Xiaoni
    Wang, Caifen
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Cell Selection Game in 5G Heterogeneous Networks
    Gharam, Maroua
    Boudriga, Noureddine
    UBIQUITOUS NETWORKING, UNET 2018, 2018, 11277 : 28 - 39
  • [37] Mode Selection for 5G Heterogeneous and Opportunistic Networks
    Carmen Lucas-Estan, M.
    Gozalvez, Javier
    IEEE ACCESS, 2019, 7 : 113511 - 113524
  • [38] A Similarity-Based Method for Base Station Selection in 5G Networks
    Zhang, Lei
    Chen, Xuefei
    Ma, Yuxiang
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1060 - 1066
  • [39] Traffic Steering and Network Selection in 5G Networks based on Reinforcement Learning
    Priscoli, Francesco Delli
    Giuseppi, Alessandro
    Liberati, Francesco
    Pietrabissa, Antonio
    2020 EUROPEAN CONTROL CONFERENCE (ECC 2020), 2020, : 595 - 601
  • [40] A new authentication and key agreement protocol for 5G wireless networks
    Tian Liu
    Fan Wu
    Xiong Li
    Chaoyang Chen
    Telecommunication Systems, 2021, 78 : 317 - 329