A smart lightweight privacy preservation scheme for IoT-based UAV communication systems

被引:48
|
作者
Deebak, B. D. [1 ]
Al-Turjman, Fadi [2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Near East Univ, Res Ctr AI & IoT, Artificial Intelligence Dept, Mersin 10, Nicosia, Turkey
关键词
Unmanned aerial vehicle; Internet of drone; Authentication; Session-key agreement; Privacy-preserving; KEY AGREEMENT SCHEME; UNMANNED AERIAL VEHICLES; AUTHENTICATION; INTERNET; SECURITY; THINGS; FRAMEWORK; NETWORKS; SURVEILLANCE; DESIGN;
D O I
10.1016/j.comcom.2020.08.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicle (UAV) has extensively been practiced in the military and civilian surveillance systems that access sensitive data over the cellular networks. However, channel insecurity and battery limitation may not protect the aerial coverage area. Thus, sensitive information gathered through aerial vehicles causes security threats. To manage the security issues, Smart Internet of Drone (S-IoD) have been evolved to use Intelligent Personal Assistant (IPA) as a software agent while monitoring and observing areas of interest. The current state-of-the-art technologies provide ubiquitous communication to enable several Internet of Things (IoT) paradigms. It achieves a feature of a decision support system that allows the smart interaction and communication between real-time entities. IPA offers smart interaction with other smart real-time entities to gain the user's knowledge and awareness. This paper presents an S-IoD framework for a UAV environment that independently collects sensible information. In order to reduce the computation cost of the authentication protocol, a lightweight privacy-preserving scheme (L-PPS) is introduced. The proposed L-PPS is constructive to provide the robustness between the IoT devices with a valid authentication period. To demonstrate the security and performance efficiencies, the formal verification was performed using a verification tool, Scyther, and a random oracle model. In addition, the proposed L-PPS introduces a secret token and dynamic user authentication to speed up the authentication process between the communication entities. Importantly, the authentication session of L-PPS does not use any complex cryptographic operations, whereby it has less computation and communication costs to meet the standard constraints of surveillance systems. Moreover, the obtained simulation analysis proves that the proposed L-PPS achieves better quality metrics than other authentication schemes in the literature.
引用
收藏
页码:102 / 117
页数:16
相关论文
共 50 条
  • [31] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Esfahani, Maryam Nasr
    Ghahfarokhi, Behrouz Shahgholi
    Borujeni, Shahram Etemadi
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (02): : 2067 - 2127
  • [32] An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
    Deebak, B. D.
    Al-Turjman, Fadi
    Aloqaily, Moayad
    Alfandi, Omar
    IEEE ACCESS, 2019, 7 : 135632 - 135649
  • [33] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    The Journal of Supercomputing, 2024, 80 : 2067 - 2127
  • [34] (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
    Hongtao Li
    Feng Guo
    Wenyin Zhang
    Jie Wang
    Jinsheng Xing
    Journal of Medical Systems, 2018, 42
  • [35] A Review and Development Methodology of a LightWeight Security Model for IoT-based Smart Devices
    Gurunathan, Mathuri
    Mahmoud, Moamin A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 125 - 134
  • [36] A review and development methodology of a lightweight security model for IoT-based smart devices
    Gurunathan M.
    Mahmoud M.A.
    1600, Science and Information Organization : 125 - 134
  • [37] (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
    Li, Hongtao
    Guo, Feng
    Zhang, Wenyin
    Wang, Jie
    Xing, Jinsheng
    JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (03)
  • [38] Distributed aerial processing for IoT-based edge UAV swarms in smart farming
    Mukherjee, Anandarup
    Misra, Sudip
    Sukrutha, Anumandala
    Raghuwanshi, Narendra Singh
    COMPUTER NETWORKS, 2020, 167
  • [39] A Video Deduplication Scheme with Privacy Preservation in IoT
    Li, Xuan
    Lin, Jie
    Li, Jin
    Jin, Biao
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015), 2016, 575 : 409 - 417
  • [40] Perception Layer Lightweight Certificateless Authentication Scheme for IoT-Based Emergency Logistics
    Yang, Jianxi
    Fan, Jinpo
    Zhu, Xiaochen
    IEEE ACCESS, 2023, 11 : 14350 - 14364