Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems

Published: 06 May 2024 Publication History

Abstract

The visual information processing technology based on deep learning can play many important yet assistant roles for unmanned aerial vehicles (UAV) navigation in complex environments. Traditional centralized architectures usually rely on a cloud server to perform model inference tasks, which can lead to long communication latency. Using transfer learning to unload deep neural networks to the edge-fog collaborative networks has become a new paradigm for dealing with the conflicts between computing resources and communication latency. However, ensuring the security of edge-fog collaborative networks entity remains challenging. For such, we propose an anonymous authentication and group key agreement scheme for the UAV-enabled edge-fog collaborative networks, consisting of the UAV authentication protocol and the collaborative networks authentication protocol. Utilizing the AVISPA assessment tool and security analysis, the security requirements and functional features of the proposed scheme are demonstrated. From the performance results of the proposed scheme, we show that it is superior to existing authentication schemes and promising.

References

[1]
Zeeshan Ali, Shehzad Ashraf Chaudhry, Muhammad Sher Ramzan, and Fadi Al-Turjman. 2020. Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles. IEEE Access 8 (2020), 43711–43724.
[2]
Tejasvi Alladi, Naren, Gaurang Bansal, Vinay Chamola, and Mohsen Guizani. 2020. SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Transactions on Vehicular Technology 69, 12 (2020), 15068–15077.
[3]
Aqeel Anwar and Arijit Raychowdhury. 2020. Autonomous navigation via deep reinforcement learning for resource constraint edge nodes using transfer learnings. IEEE Access 8 (2020), 26549–26560.
[4]
Geumhwan Cho, Junsung Cho, Sangwon Hyun, and Hyoungshick Kim. 2020. SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles. Applied Sciences 10, 9 (2020), 3149–3168.
[5]
Danny Dolev and Andrew Chi-Chih Yao. 1983. On the security of public key protocols. IEEE Transactions on Information Theory 29, 2 (1983), 198–208.
[6]
YoneyKirsal Ever. 2020. A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications. Computer Communications 155, 1 (2020), 143–149.
[7]
Vincent François-Lavet, Peter Henderson, Riashat Islam, Marc G. Bellemare, and Joelle Pineau. 2018. An introduction to deep reinforcement learning. IEEE Transactions on Mobile Computing 11, 3-4 (2018), 219–354.
[8]
Yong Gan, Bingli Wang, Yuan Zhuang, Yuan Gao, Zhigang Li, and Qikun Zhang. 2021. An asymmetric group key agreement protocol based on attribute threshold for Internet of Things. Transactions on Emerging Telecommunications Technologies 32, 5 (2021), e4179.
[9]
Ali Hamdi, Flora D. Salim, Du Yong Kim, Azadeh Ghari Neiat, and Athman Bouguettaya. 2021. Drone-as-a-service composition under uncertainty. IEEE Transactions on Services Computing 15, 5 (2021), 2685–2698.
[10]
Yixue Hao, Min Chen, Long Hum, Ahmed Ghoneim, and Joelle Pineau. 2018. Energy efficient task caching and offloading for mobile edge computing. IEEE Access 6 (2018), 11365–11373.
[11]
Cheol Ho Hong and Blesson Varghese. 2019. Resource management in fog/edge computing: A survey on architectures, infrastructure. ACM Computing Surveys 52, 5 (2019), 1–37.
[12]
Xin Huang, Xiaoya Dong, Jing Ma, Kuan Liu, Shibbir Ahmed, Jinlong Lin, and Baijing Qiu. 2021. The improved A* obstacle avoidance algorithm for the plant protection UAV with millimeter wave radar and monocular camera data fusion. Remote Sensing 13, 17 (2021), 3364–3386.
[13]
Maged Hamada Ibrahim. 2016. OCTOPUS: An edge-fog mutual authentication scheme. International Journal of Network Security 18, 6 (2016), 1089–1101.
[14]
Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, and Yuanyuan Yang. 2016. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications 76 (2016), 37–48.
[15]
Qi Jiang, Ning Zhang, Jianbing Ni, Jianfeng Ma, Xindi Ma, and Kim-Kwang Raymond Choo. 2020. Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Transactions on Vehicular Technology 69, 9 (2020), 9390–9401.
[16]
Yuhui Li, Wei Liang, Li Peng, Dafang Zhang, Cheng Yang, and Kuan-Ching Li. 2022. Predicting drug-target interactions via dual-stream graph neural network. IEEE/ACM Transactions on Computational Biology and Bioinformatics. Published Online, September 8, 2022. DOI:
[17]
Wei Liang, Yuhui Li, Kun Xie, Dafang Zhang, Kuan-Ching Li, Alireza Souri, and Keqin Li. 2022. Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Transactions on Intelligent Transportation Systems. Published Online, March 14, 2022. DOI:
[18]
Wei Liang, Yuhui Li, Jianlong Xu, ZhengQin, Dafang Zhang, and Kuan-Ching Li. 2023. QoS prediction and adversarial attack protection for distributed services under DLaaS. IEEE Transactions on Computers 73, 3 (2023), 669–682. DOI:https://doi:10.1109/TC.2021.3077738
[19]
Wei Liang, Yang Yang, Ce Yang, Yonghua Hu, Songyou Xie, Kuan-Ching Li, and Jiannong Cao. 2022. PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability. Published Online, August 5, 2022. DOI:https://doi:10.1109/TR.2022.3190932
[20]
Wei Liang, Dafang Zhang, Xia Lei, Mingdong Tang, Kuan-Ching Li, and Albert Zomaya. 2020. Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection. IEEE Transactions on Emerging Topics in Computing 9, 3 (2020), 1410–1420.
[21]
Chi Harold Liu, Xiaoxin Ma, Xudong Gao, and Jian Tang. 2020. Distributed energy-efficient multi-UAV navigation for long-term communication coverage by deep reinforcement learning. IEEE Transactions on Mobile Computing 19, 6 (2020), 1274–1285.
[22]
Jing Long, Wei Liang, Kuan-Ching Li, Yehua Wei, and Mario Donato Marino. 2022. A regularized cross-layer ladder network for intrusion detection in Industrial Internet-of-Things. IEEE Transactions on Industrial Informatics. Published Online, September 5, 2022. DOI:https://doi:10.1109/TII.2022.3204034
[23]
Haoyu Luo, Tianxiang Chen, Xuejun Li, Shuangyin Li, Chong Zhang, Gansen Zhao, and Xiao Liu. 2022. KeepEdge: A knowledge distillation empowered edge intelligence framework for visual assisted positioning in UAV delivery. IEEE Transactions on Mobile Computing. Published Online, March 9, 2022. DOI:
[24]
Ming Luo, Jiayu Wu, and Xiangjun Li. 2020. Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommunication Systems 74, 4 (2020), 437–449.
[25]
Susmita Mandal, Sujata Mohanty, and Banshidhar Majhi. 2020. CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks. Wireless Networks 26, 4 (2020), 3011–3031.
[26]
Hamid Menouar, Ismail Guvenc, Kemal Akkaya, A. Selcuk Uluagac, Abdullah Kadri, and Adem Tuncer. 2017. UAV-enabled intelligent transportation systems for the smart city: Applications and challenges. IEEE Communications Magazine 55, 3 (2017), 22–28.
[27]
Marco Passafiume, Neda Rojhani, Giovanni Collodi, and Alessandro Cidronali. 2021. Modeling small UAV micro-Doppler signature using millimeter-wave FMCW radar. Electronics 10, 6 (2021), 747–763.
[28]
Pradip Kumar Sharma and Jong Hyuk Park. 2021. Blockchain-based secure mist computing network architecture for intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems 22, 8 (2021), 5168–5177.
[29]
Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, and Joel J. P. C. Rodrigues. 2019. TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of Drones environment. IEEE Transactions on Vehicular Technology 68, 7 (2019), 6903–6916.
[30]
Shigeki Sugimoto, Hayato Tatesa, Hidekazu Takahashi, and Masatoshi Okutumi. 2004. Obstacle detection using millimeter-wave radar and its visualization on image sequence. In Proceedings of the 17th International Conference on Pattern Recognition.342–345.
[31]
Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, and Huaxiong Wang. 2015. A provable authenticated group key agreement protocol for mobile environment. Information Sciences 321 (2015), 224–237.
[32]
Tarik Taleb, Konstantinos Samdanis, Badr Mada, Hannu Flinck, Sunny Dutta, and Dario Sabella. 2017. On multi-access edge computing: A survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Communications Surveys and Tutorials 19, 3 (2017), 1657–1681.
[33]
Zaib Ullah, Fadi Al-Turjman, and Leonardo Mostarda. 2020. Cognition in UAV-aided 5G and beyond communications: A survey. IEEE Transactions on Cognitive Communications and Networking 6, 3 (2020), 872–891.
[34]
Wenming Wang, Haiping Huang, Lingyan Xue, Qi Li, Reza Malekian, and Youzhi Zhang. 2021. Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment. Journal of Systems Architecture 115 (2021), 102024. DOI:
[35]
Wenming Wang, Haiping Huang, Lingyan Xue, Qi Li, Reza Malekian, and Youzhi Zhang. 2022. A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks. IET Communications 16, 10 (2022), 1142–1159.
[36]
Zhangjing Wang, Xianhan Miao, Zhen Huang, and Haoran Luo. 2021. Research of target detection and classification techniques using millimeter-wave radar and vision sensors. Remote Sensing 13, 6 (2021), 1064–1087.
[37]
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos, and Joel J. P. C. Rodrigues. 2018. Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones deployment. IEEE Internet of Things Journal 6, 2 (2018), 3572–3584.
[38]
Hu Xiong, Yan Wu, and Zhenyu Lu. 2019. A survey of group key agreement protocols with constant rounds. ACM Computing Surveys 52, 3 (2019), 1–32.
[39]
Xiaolong Xu, Daoming Li, Zhonghui Dai, Shancang Li, and Xuening Chen. 2019. A heuristic offloading method for deep learning edge services in 5G networks. IEEE Access 7 (2019), 67734–67744.
[40]
Zisang Xu, Wei Liang, Kuan-Ching Li, Jianbo Xu, Albert Y. Zomaya, and Jixin Zhang. 2022. A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for Industry 5.0. IEEE Transactions on Industrial Informatics 18, 10 (2022), 7118–7127.
[41]
Jing Zhang, Jie Cui, Hong Zhang, Irina Bolodurina, and Lu Liu. 2021. Intelligent drone-assisted anonymous authentication and key agreement for 5G/B5G vehicular ad-hoc networks. IEEE Transactions on Network Science and Engineering 8, 4 (2021), 2982–2994.
[42]
Qikun Zhang, Xianmin Wang, Junling Yuan, Lu Liu, Ruifang Wang, Hong Huang, and Yuanzhang Li. 2019. A hierarchical group key agreement protocol using orientable attributes for cloud computing. Information Sciences 480 (2019), 55–69.
[43]
Yuke Zhu, Roozbeh Mottaghi, Eric Kolve, Joseph J. Lim, Abhinav Gupta, Fei-Fei Li, and Ali Farhadi. 2017. A fast defogging image recognition algorithm based on bilateral hybrid filtering. In Proceedings of the IEEE International Conference on Robotics and Automation.DOI:

Index Terms

  1. An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 20, Issue 3
    May 2024
    634 pages
    EISSN:1550-4867
    DOI:10.1145/3613571
    • Editor:
    • Wen Hu
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 06 May 2024
    Online AM: 10 April 2024
    Accepted: 27 March 2024
    Revised: 21 November 2023
    Received: 31 December 2022
    Published in TOSN Volume 20, Issue 3

    Check for updates

    Author Tags

    1. Edge-fog collaborative networks
    2. transfer learning
    3. mutual authentication
    4. group key agreement
    5. UAV

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China
    • Science and Technology Project of the Department of Communications of Hunan Provincial
    • Key Research and Development Program of Hunan Province
    • Hunan Provincial Natural Science Foundation of China
    • Central South University Research Programme of Advanced Interdisciplinary Studies
    • King Saud University, Riyadh, Saudi Arabia

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 183
      Total Downloads
    • Downloads (Last 12 months)183
    • Downloads (Last 6 weeks)33
    Reflects downloads up to 19 Nov 2024

    Other Metrics

    Citations

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media