Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs

被引:32
|
作者
Tan, Haowen [1 ]
Zheng, Wenying [2 ]
Vijayakumar, Pandi [3 ]
机构
[1] Zhejiang Sci Tech Univ, Sch Informat Sci & Engn, Hangzhou 310018, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
基金
中国国家自然科学基金;
关键词
Authentication; Security; Autonomous aerial vehicles; Servers; Vehicle dynamics; Real-time systems; Protocols; Internet of Vehicles (IoVs); unmanned aerial vehicle (UAV); authentication; group key distribution; key updating; PRIVACY-PRESERVING AUTHENTICATION; DUAL AUTHENTICATION; DATA-TRANSMISSION; VEHICLES; PROTOCOL; INTERNET; RSUS;
D O I
10.1109/TITS.2023.3252082
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Nowadays, with the purpose of fulfilling the increasing demands for emerging extensive and ubiquitous accessibility to modern intelligent transportation systems (ITS), the conventional vehicle-to-everything (V2X) paradigms are progressively evolving into the Internet of vehicles (IoVs). As of now, substantial enhancements in IoV technologies have been witnessed, particularly in the era of vehicular data secure exchange and user privacy protection. On the other hand, unmanned aerial vehicles (UAVs) are envisioned to provide scalable and adaptive stereoscopic service coverage for IoV implementations. However, the existing approaches intended for the common scenarios mainly rely on the well-established local IoV infrastructures, whereas the specific infrastructure-less IoVs with dysfunctional edge facilities have not been properly investigated. Additionally, the related UAV-assisted IoV schemes still fail to independently perform the secure vehicular data transmission but rather as the auxiliary strategies due to the dependence on the assistance of local edge deployment. Therefore, the practical requirements of reliability and scalability in real-world IoV circumstances cannot be satisfied. In this paper, an efficient UAV certificateless group authentication mechanism is developed in order to facilitate the secure data transmission of infrastructure-less IoV. The proposed design deploys the tethered UAV (TUAV) as the specific mobilized base station so that the active edge IoV infrastructure is not needed. The security analysis regarding the key security features are presented first, followed by the performance evaluation. According to the comparison results with the existing designs, improvements in terms of computational cost and communication overhead for different phases can be demonstrated.
引用
收藏
页码:6389 / 6400
页数:12
相关论文
共 50 条
  • [21] An efficient key management scheme for secure sensor networks
    Du, RY
    Tu, HJ
    Wen, S
    PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 279 - 283
  • [22] Efficient Key Management Scheme for Secure Multicast in MANET
    Lakshmanaperumal, J.
    Thanushkodi, K.
    Kumar, N. M. Saravana
    Saravanan, K.
    Vigneshwaran, D.
    Purusothaman, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 157 - 164
  • [23] An efficient key management scheme for secure wireless multicast
    Sun, Y
    Trappe, W
    Liu, KJR
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1236 - 1240
  • [24] Artificial noise aided scheme to secure UAV-assisted Internet of Things with wireless power transfer
    Wang, Qubeijian
    Dai, Hong-Ning
    Li, Xuran
    Shukla, Mahendra K.
    Imran, Muhammad
    COMPUTER COMMUNICATIONS, 2020, 164 : 1 - 12
  • [25] Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
    Kang, Dongwoo
    Jung, Jaewook
    Kim, Hyoungshick
    Lee, Youngsook
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [26] Online Edge Learning Offloading and Resource Management for UAV-Assisted MEC Secure Communications
    Ding, Yu
    Feng, Yunqi
    Lu, Weidang
    Zheng, Shilian
    Zhao, Nan
    Meng, Limin
    Nallanathan, Arumugam
    Yang, Xiaoniu
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2023, 17 (01) : 54 - 65
  • [27] An Efficient Key Agreement Scheme for Infrastructure Less Wireless Network (ILWN)
    Nayeem, Golam Moktader
    Khan, Md. Ataur Rahman
    Mottalib, M. A.
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 271 - 275
  • [28] Secure and Efficient Recommendation Service of RFID System using Authenticated Key Management
    Kim, Jinsu
    Song, Changwoo
    Kim, Taeyong
    Rim, Keewook
    Lee, Junghyun
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 46 - +
  • [29] Energy-efficient remote mobile device management in infrastructure-less environment for emergency assessment
    Pandey, Vipin Kumar
    De, Suddhasil
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (15)
  • [30] Energy Efficient Edge Computing and Data Compression Collaboration Scheme for UAV-Assisted Network
    Cheng, Kaijun
    Fang, Xuming
    Wang, Xianbin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16395 - 16408