全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

面向智慧城市监控的无人机网络身份认证方案的分析与改进
Analysis and Improvement of Identity Authentication Scheme for UAV Network for Smart City Surveillance

DOI: 10.12677/CSA.2021.119244, PP. 2387-2395

Keywords: 认证方案,密钥协商,无人机,智慧城市
Authentication Scheme
, Key Agreement, UAV, Smart City

Full-Text   Cite this paper   Add to My Lib

Abstract:

智慧城市中的无人机在环境监测领域的应用越来越广泛,无人机被用来收集信息,用户通过他们的移动设备与特定飞行区域的无人机通信,以实时获取数据,所以无人机通信实体间传输数据的安全变得尤为重要。所以,为了避免敏感信息遭到截获和篡改则需要一个高效和安全的认证方案来使用户和无人机之间实现保密通信。2020年,Nikooghadam等人提出了一个可证明安全的轻量级智能城市监控无人机互联网认证方案。然而,本文分析了Nikooghadam等人提出的方案的安全性指出了该方案不能抵抗跟踪攻击、假冒用户攻击和假冒无人机攻击,为了克服该方案的安全缺陷,本文通过更新与用户有关的重要信息,提出一个改进方案。经过逻辑安全性分析以及与相关认证方案安全功能、计算通信开销的分析比较,证明了改进方案可以抵抗多种攻击,能够实现安全和高效的身份认证。
UAVs in smart cities are increasingly widely used in the field of environmental monitoring. UAVs are used to collect information, and users communicate with UAVs in specific flight areas through their mobile devices to obtain real-time data. Therefore, the safety of data transmission between UAVs becomes particularly important. Therefore, in order to avoid the interception and tampering of sensitive information, an efficient and secure authentication scheme is needed to achieve secure communication between the user and the UAV. In 2020, Nikooghadam et al. proposed an Internet certification scheme for a lightweight and provably safe smart city surveillance drone. However, this paper analyzes the security of the scheme proposed by Nikooghadam et al. and points out that the scheme cannot resist tracking attack, impersonating user attack and impersonating drone attack. In order to overcome the security defects of the scheme, this paper proposes an improved scheme by updating important information related to users. Through the analysis of logical security and the comparison with the security function and computational communication cost of related authenti-cation schemes, it is proved that the improved scheme can resist various attacks and achieve secure and efficient identity authentication.

References

[1]  Nikooghadam, M., Haleh, A., Hafizulislam, S.K. and Moghadam, M.F. (2020) A Provably Secure and Lightweight Au-thentication Scheme for Internet of Drones for Smart City Surveillance. Journal of Systems Architecture, 115, Article No. 101955.
https://doi.org/10.1016/j.sysarc.2020.101955
[2]  李超. 基于无人机的安防监控系统在智慧城市中的应用前景与实现[J]. 科技广场, 2014(6): 72-75.
[3]  Cuffari, B. (2018) Using Sensors in Drones.
https://www.azosensors.com/article.aspx?ArticleID=1149
[4]  Sharma, V., Song, F., You, I. and Atiquzzaman, M. (2017) Energy Efficient Device Discovery for Reliable Communication in 5G-Based IoT and BSNS Using Un-manned Aerial Vehicles. Journal of Network and Computer Applications, 97, 79-95.
https://doi.org/10.1016/j.jnca.2017.08.013
[5]  Chen, Y.-J. and Wang, L.-C. (2018) Privacy Protection for Internet of Drones: A Network Coding Approach. IEEE Internet of Things Journal, 6, 1719-1730.
https://doi.org/10.1109/JIOT.2018.2875065
[6]  Aggarwal, S. and Kumar, N. (2020) Path Planning Techniques for Unmanned Aerial Vehicles: A Review, Solutions, and Challenges. Computer Communications, 149, 270-299.
https://doi.org/10.1016/j.comcom.2019.10.014
[7]  Lamport, L. (1981) Password Authentication with Insecure Communication. Communications of the ACM, 24, 770-772.
https://doi.org/10.1145/358790.358797
[8]  Seo, S.-H., Won, J., Bertino, E., Kang, Y. and Choi, D. (2016) A Security Framework for a Drone Delivery Service. Pro-ceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, Singapore, 26 June 2016, 29-34.
https://doi.org/10.1145/2935620.2935629
[9]  Won, J., Seo, S.H. and Bertino, E. (2017) Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications. IEEE Access, 5, 3721-3749.
https://doi.org/10.1109/ACCESS.2017.2684128
[10]  Cheon, J.H., Han, K., Hong, S.-M., Kim, H.J., Kim, J., Kim, S., Seo, H., Shim, H. and Song, Y. (2018) Toward a Secure Drone System: Flying with Real-Time Homomorphic Au-thenticated Encryption. IEEE Access, 6, 24325-24339.
https://doi.org/10.1109/ACCESS.2018.2819189
[11]  Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.J. (2019) TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environ-ment. IEEE Transactions on Vehicular Technology, 68, 6903-6916.
https://doi.org/10.1109/TVT.2019.2911672
[12]  Ali, Z., Chaudhry, S.A., Ramzan, M.S. and Al-Turjman, F. (2020) Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles. IEEE Ac-cess, 8, 43711-43724.
https://doi.org/10.1109/ACCESS.2020.2977817
[13]  Li, T., Ma, J., Feng, P., Meng, Y., Ma, X., Zhang, J., et al. (2019) Lightweight Security Authentication Mechanism towards UAV Networks. 2019 International Conference on Networking and Network Applications (NaNA), Daegu, 10-13 October 2019, 379-384.
https://doi.org/10.1109/NaNA.2019.00072
[14]  Bera, B., Chattaraj, D. and Das, A.K. (2020) Designing Secure Blockchain-Based Access Control Scheme in IoT-Enabled Internet of Drones Deployment. Computer Communications, 153, 229-249.
https://doi.org/10.1016/j.comcom.2020.02.011
[15]  Ever, Y.K. (2020) A Secure Authentication Scheme Frame-work for Mobile-Sinks Used in the Internet of Drones Applications. Computer Communications, 155, 143-149.
[16]  Zhang, Y., He, D., Li, L. and Chen, B. (2020) A Lightweight Authentication and Key Agreement Scheme for Internet of Drones. Computer Communications, 154, 455-464.
https://doi.org/10.1016/j.comcom.2020.02.067
[17]  Haq, I., Wang, J., Zhu, Y. and Maqbool, S. (2020) An Effi-cient Hash-Based Authenticated Key Agreement Scheme for Multi-Server Architecture Resilient to Key Compromise Impersonation. Digital Communications and Networks, 7, 140-150.
https://doi.org/10.1016/j.dcan.2020.05.001
[18]  Dhillon, P.K. and Kalra, S. (2017) Secure Multi-Factor Remote User Authentication Scheme for Internet of Things Environments. International Journal of Communication Systems, 30, Article No. e3323.
https://doi.org/10.1002/dac.3323
[19]  Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V., Rodrigues, J.J.P.C. (2019) 550 Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in In-ternet of Drones Deployment. IEEE Internet of Things Journal, 6, 3572-3584.
https://doi.org/10.1109/JIOT.2018.2888821

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133