Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs

被引:32
|
作者
Tan, Haowen [1 ]
Zheng, Wenying [2 ]
Vijayakumar, Pandi [3 ]
机构
[1] Zhejiang Sci Tech Univ, Sch Informat Sci & Engn, Hangzhou 310018, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
基金
中国国家自然科学基金;
关键词
Authentication; Security; Autonomous aerial vehicles; Servers; Vehicle dynamics; Real-time systems; Protocols; Internet of Vehicles (IoVs); unmanned aerial vehicle (UAV); authentication; group key distribution; key updating; PRIVACY-PRESERVING AUTHENTICATION; DUAL AUTHENTICATION; DATA-TRANSMISSION; VEHICLES; PROTOCOL; INTERNET; RSUS;
D O I
10.1109/TITS.2023.3252082
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Nowadays, with the purpose of fulfilling the increasing demands for emerging extensive and ubiquitous accessibility to modern intelligent transportation systems (ITS), the conventional vehicle-to-everything (V2X) paradigms are progressively evolving into the Internet of vehicles (IoVs). As of now, substantial enhancements in IoV technologies have been witnessed, particularly in the era of vehicular data secure exchange and user privacy protection. On the other hand, unmanned aerial vehicles (UAVs) are envisioned to provide scalable and adaptive stereoscopic service coverage for IoV implementations. However, the existing approaches intended for the common scenarios mainly rely on the well-established local IoV infrastructures, whereas the specific infrastructure-less IoVs with dysfunctional edge facilities have not been properly investigated. Additionally, the related UAV-assisted IoV schemes still fail to independently perform the secure vehicular data transmission but rather as the auxiliary strategies due to the dependence on the assistance of local edge deployment. Therefore, the practical requirements of reliability and scalability in real-world IoV circumstances cannot be satisfied. In this paper, an efficient UAV certificateless group authentication mechanism is developed in order to facilitate the secure data transmission of infrastructure-less IoV. The proposed design deploys the tethered UAV (TUAV) as the specific mobilized base station so that the active edge IoV infrastructure is not needed. The security analysis regarding the key security features are presented first, followed by the performance evaluation. According to the comparison results with the existing designs, improvements in terms of computational cost and communication overhead for different phases can be demonstrated.
引用
收藏
页码:6389 / 6400
页数:12
相关论文
共 50 条
  • [1] UAV-assisted Intelligent IoT Service Provisioning in Infrastructure-less Environments
    Zheng, Qiushi
    Shen, Zhishu
    Jin, Jiong
    Lei, Zheng
    Cheung, Tommy
    Xiang, Wei
    2024 IEEE ANNUAL CONGRESS ON ARTIFICIAL INTELLIGENCE OF THING, AIOT 2024, 2024, : 176 - 181
  • [2] VDNet: an infrastructure-less UAV-assisted sparse VANET system with vehicle location prediction
    Wang, Xiong
    Fu, Luoyi
    Zhang, Yang
    Gan, Xiaoying
    Wang, Xinbing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (17): : 2991 - 3003
  • [3] An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks
    Tan, Haowen
    Zheng, Wenying
    Vijayakumar, Pandi
    Sakurai, Kouichi
    Kumar, Neeraj
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) : 15590 - 15600
  • [4] A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue
    Cui, Jie
    Liu, Xinzhong
    Zhong, Hong
    Zhang, Jing
    Wei, Lu
    Bolodurina, Irina
    He, Debiao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 1454 - 1468
  • [5] A Secure Downlink Transmission Scheme for a UAV-Assisted Edge Network
    Gao, Xinmei
    Huo, Yan
    Gao, Qinghe
    Zhao, Hongjun
    Ma, Long
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [6] A secure and efficient authenticated key exchange scheme for smart grid
    Xia, Zhe
    Liu, Tao
    Wang, Jingjing
    Chen, Shi
    HELIYON, 2023, 9 (07)
  • [7] A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue
    Wang, Yuntao
    Su, Zhou
    Xu, Qichao
    Li, Ruidong
    Luan, Tom H.
    Wang, Pinghui
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (06) : 2422 - 2438
  • [8] Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing
    Alhassan, Maryam
    Khan, Abdul Raouf
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2727 - 2740
  • [9] A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 17 - 31
  • [10] UAV-Assisted Quantum Key Distribution for Secure Communications With Resource Limited Devices
    Kong, Peng-Yong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (08) : 11923 - 11933