Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs

被引:32
|
作者
Tan, Haowen [1 ]
Zheng, Wenying [2 ]
Vijayakumar, Pandi [3 ]
机构
[1] Zhejiang Sci Tech Univ, Sch Informat Sci & Engn, Hangzhou 310018, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
基金
中国国家自然科学基金;
关键词
Authentication; Security; Autonomous aerial vehicles; Servers; Vehicle dynamics; Real-time systems; Protocols; Internet of Vehicles (IoVs); unmanned aerial vehicle (UAV); authentication; group key distribution; key updating; PRIVACY-PRESERVING AUTHENTICATION; DUAL AUTHENTICATION; DATA-TRANSMISSION; VEHICLES; PROTOCOL; INTERNET; RSUS;
D O I
10.1109/TITS.2023.3252082
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Nowadays, with the purpose of fulfilling the increasing demands for emerging extensive and ubiquitous accessibility to modern intelligent transportation systems (ITS), the conventional vehicle-to-everything (V2X) paradigms are progressively evolving into the Internet of vehicles (IoVs). As of now, substantial enhancements in IoV technologies have been witnessed, particularly in the era of vehicular data secure exchange and user privacy protection. On the other hand, unmanned aerial vehicles (UAVs) are envisioned to provide scalable and adaptive stereoscopic service coverage for IoV implementations. However, the existing approaches intended for the common scenarios mainly rely on the well-established local IoV infrastructures, whereas the specific infrastructure-less IoVs with dysfunctional edge facilities have not been properly investigated. Additionally, the related UAV-assisted IoV schemes still fail to independently perform the secure vehicular data transmission but rather as the auxiliary strategies due to the dependence on the assistance of local edge deployment. Therefore, the practical requirements of reliability and scalability in real-world IoV circumstances cannot be satisfied. In this paper, an efficient UAV certificateless group authentication mechanism is developed in order to facilitate the secure data transmission of infrastructure-less IoV. The proposed design deploys the tethered UAV (TUAV) as the specific mobilized base station so that the active edge IoV infrastructure is not needed. The security analysis regarding the key security features are presented first, followed by the performance evaluation. According to the comparison results with the existing designs, improvements in terms of computational cost and communication overhead for different phases can be demonstrated.
引用
收藏
页码:6389 / 6400
页数:12
相关论文
共 50 条
  • [31] Energy-Efficient Resource Management in UAV-Assisted Mobile Edge Computing
    Tun, Yan Kyaw
    Park, Yu Min
    Tran, Nguyen H.
    Saad, Walid
    Pandey, Shashi Raj
    Hong, Choong Seon
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (01) : 249 - 253
  • [32] SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios
    Cheng, Yuyang
    Xu, Shiyuan
    Cao, Yibo
    He, Yunhua
    Xiao, Ke
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT II, 2022, 13472 : 356 - 364
  • [33] An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks
    Daniel, Renu Mary
    Rajsingh, Elijah Blessing
    Silas, Salaja
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 156 - 172
  • [34] Efficient and quantum-secure authenticated key exchange scheme for mobile satellite communication networks
    Mishra, Dheerendra
    Rewal, Purva
    Pursharthi, Komal
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2024, 42 (04) : 313 - 328
  • [35] Efficient key management scheme for secure application level multicast
    Bettahar, Hatem
    Alkubeily, Mothanna
    Bouabdallah, Abdelmadjid
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 430 - 435
  • [36] An efficient scalable key management scheme for secure group communication
    张骏
    谷大武
    马范援
    白英彩
    Journal of Harbin Institute of Technology, 2006, (05) : 607 - 612
  • [37] A secure and efficient key management scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 162 - 167
  • [38] An Energy-Efficient Scheme Design for NOMA-Based UAV-Assisted MEC Systems
    Wang, Shanshan
    Luo, Zhiyong
    ELECTRONICS, 2024, 13 (21)
  • [39] A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid
    Liu, Nian
    Chen, Jinshan
    Zhu, Lin
    Zhang, Jianhua
    He, Yanling
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2013, 60 (10) : 4746 - 4756
  • [40] Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment
    Lee, Jun Ho
    Lee, Dong Hoon
    2008 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2008, : 484 - 485