A smart lightweight privacy preservation scheme for IoT-based UAV communication systems

被引:47
|
作者
Deebak, B. D. [1 ]
Al-Turjman, Fadi [2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Near East Univ, Res Ctr AI & IoT, Artificial Intelligence Dept, Mersin 10, Nicosia, Turkey
关键词
Unmanned aerial vehicle; Internet of drone; Authentication; Session-key agreement; Privacy-preserving; KEY AGREEMENT SCHEME; UNMANNED AERIAL VEHICLES; AUTHENTICATION; INTERNET; SECURITY; THINGS; FRAMEWORK; NETWORKS; SURVEILLANCE; DESIGN;
D O I
10.1016/j.comcom.2020.08.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicle (UAV) has extensively been practiced in the military and civilian surveillance systems that access sensitive data over the cellular networks. However, channel insecurity and battery limitation may not protect the aerial coverage area. Thus, sensitive information gathered through aerial vehicles causes security threats. To manage the security issues, Smart Internet of Drone (S-IoD) have been evolved to use Intelligent Personal Assistant (IPA) as a software agent while monitoring and observing areas of interest. The current state-of-the-art technologies provide ubiquitous communication to enable several Internet of Things (IoT) paradigms. It achieves a feature of a decision support system that allows the smart interaction and communication between real-time entities. IPA offers smart interaction with other smart real-time entities to gain the user's knowledge and awareness. This paper presents an S-IoD framework for a UAV environment that independently collects sensible information. In order to reduce the computation cost of the authentication protocol, a lightweight privacy-preserving scheme (L-PPS) is introduced. The proposed L-PPS is constructive to provide the robustness between the IoT devices with a valid authentication period. To demonstrate the security and performance efficiencies, the formal verification was performed using a verification tool, Scyther, and a random oracle model. In addition, the proposed L-PPS introduces a secret token and dynamic user authentication to speed up the authentication process between the communication entities. Importantly, the authentication session of L-PPS does not use any complex cryptographic operations, whereby it has less computation and communication costs to meet the standard constraints of surveillance systems. Moreover, the obtained simulation analysis proves that the proposed L-PPS achieves better quality metrics than other authentication schemes in the literature.
引用
收藏
页码:102 / 117
页数:16
相关论文
共 50 条
  • [21] Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data
    Li, Shuai
    Li, Miao
    Xu, Haitao
    Zhou, Xianwei
    [J]. SENSORS, 2019, 19 (05)
  • [22] A survey on communication components for IoT-based technologies in smart homes
    A. A. Zaidan
    B. B. Zaidan
    M. Y. Qahtan
    O. S. Albahri
    A. S. Albahri
    Mussab Alaa
    F. M. Jumaah
    Mohammed Talal
    K. L. Tan
    W. L. Shir
    C. K. Lim
    [J]. Telecommunication Systems, 2018, 69 : 1 - 25
  • [23] A survey on communication components for IoT-based technologies in smart homes
    Zaidan, A. A.
    Zaidan, B. B.
    Qahtan, M. Y.
    Albahri, O. S.
    Albahri, A. S.
    Alaa, Mussab
    Jumaah, F. M.
    Talal, Mohammed
    Tan, K. L.
    Shir, W. L.
    Lim, C. K.
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 69 (01) : 1 - 25
  • [24] IoT-based Predictive Maintenance for Smart Manufacturing Systems
    Him, Leong Chee
    Poh, Yu Yong
    Pheng, Lee Wah
    [J]. 2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1942 - 1944
  • [25] An Identity-Based Encryption Scheme with Performance Optimization for Privacy Preservation in Smart Grid Communication
    Baloglu, Ulas Baran
    Demir, Yakup
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL TELECOMMUNICATIONS (ICDT 2017), 2017, : 18 - 21
  • [26] Towards sustainable IoT-based smart mobility systems in smart cities
    Alam, Tanweer
    Gupta, Ruchi
    Ahamed, N. Nasurudeen
    Ullah, Arif
    Almaghthwi, Ahmed
    [J]. GeoJournal, 2024, 89 (06)
  • [27] A Lightweight Authentication and Privacy Preservation Scheme for MQTT
    Tian, Sijia
    Vassilakis, Vassilios G.
    [J]. 38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1289 - 1292
  • [28] An IoT-Based Smart Classroom
    Paul, Chinju
    Ganesh, Amal
    Sunitha, C.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 9 - 14
  • [29] (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
    Hongtao Li
    Feng Guo
    Wenyin Zhang
    Jie Wang
    Jinsheng Xing
    [J]. Journal of Medical Systems, 2018, 42
  • [30] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Esfahani, Maryam Nasr
    Ghahfarokhi, Behrouz Shahgholi
    Borujeni, Shahram Etemadi
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (02): : 2067 - 2127