POSTER: Using Verifiable Credentials for Authentication of UAVs in Logistics

被引:0
|
作者
Watanabe, Ken [1 ]
Sako, Kazue [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Commun Engn, 3-4-1 Okubo,Shinjuku Ku, Tokyo, Japan
关键词
Verifiable Credential; Selective Disclosure; Authentication Protocol; UAV;
D O I
10.1007/978-3-031-41181-6_45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Verifiable Credentials (VCs) have been widely adopted as a format for asserting information through use of digital signature technique, and offer versatile usages. The World Wide Web Consortium (W3C) has standardized the data model for VCs [1], and the motivation for this study is to verify the applicability of its data model through a concrete, realistic scenario. For verification, we have chosen a scenario where Unmanned Aerial Vehicles (UAVs) collaborate to deliver packages. As a contribution of this study, we demonstrate how we can selectively disclose attributes of UAVs yet ensure its mission under an authorized contract. Furthermore, we propose a method for issuing receipts through use of VCs and Verifiable Presentations (VPs) that guarantees completion of delivery while UAVs remain anonymous. For this function, we developed a new format for VP, namely 'VP with Message.' These features have been implemented through a demo application.
引用
收藏
页码:710 / 715
页数:6
相关论文
共 50 条
  • [41] A human-verifiable authentication protocol using visible laser light
    Mayrhofer, Rene
    Welch, Martyn
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 1143 - +
  • [42] Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network
    Babu, Erukala Suresh
    Srinivasarao, B. K. N.
    Kavati, Ilaiah
    Rao, Mekala Srinivasa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [43] Secure and verifiable iris authentication system using fully homomorphic encryption
    Morampudi M.K.
    Prasad M.V.N.K.
    Verma M.
    Raju U.S.N.
    Computers and Electrical Engineering, 2021, 89
  • [44] Verifiable Quantum Key Exchange with Authentication
    Run-hua Shi
    Bai Liu
    Mingwu Zhang
    International Journal of Theoretical Physics, 2021, 60 : 227 - 242
  • [45] Locally Verifiable Batch Authentication in IoMT
    Mao, Wenze
    Jiang, Peng
    Zhu, Liehuang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1001 - 1014
  • [46] Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data
    Soykan, Elif Ustundag
    KaraCay, Leyli
    Bilgin, Zeki
    Tomur, Emrah
    Ersoy, Mehmet Akif
    KarakoC, Ferhat
    Comak, Pinar
    COMPUTER JOURNAL, 2022, 65 (10): : 2631 - 2640
  • [47] Verifiable Quantum Key Exchange with Authentication
    Shi, Run-hua
    Liu, Bai
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (01) : 227 - 242
  • [48] A framework for authentication and authorization credentials in cloud computing
    Gonzalez, Nelson Mimura
    Torrez Rojas, Marco Antonio
    Maciel da Silva, Marcos Vinicius
    Redigolo, Fernando
    Melo de Brito Carvalho, Tereza Cristina
    Miers, Charles Christian
    Naeslund, Mats
    Ahmed, Abu Shohel
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 509 - 516
  • [49] Decentralized Identifiers and Verifiable Credentials for Smartphone Anticounterfeiting and Decentralized IMEI Database
    Sghaier Omar, Ahmad
    Basir, Otman
    CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2020, 43 (03): : 174 - 180
  • [50] Self-Sovereign Identity and Verifiable Credentials in Your Digital Wallet
    Lacity, Mary
    Carmel, Erran
    MIS QUARTERLY EXECUTIVE, 2022, 21 (03) : 241 - 251