Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid development of wireless communication and edge computing, UAV-assisted networking technology has great significance in many application scenarios such as traffic forecasting, emergency rescue, military reconnaissance. However, due to dynamic topology changes of Flying Ad-hoc Networks (FANET), frequent identity authentication is easy to cause the instability of communications between UAV nodes, which makes FANET face serious identity security threats. Therefore, it is an inevitable trend to build a secure and reliable FANET. In this paper, we propose a lightweight mutual identity authentication scheme based on adaptive trust strategy for Flying Ad-hoc Networks (ATS-LIA), which selects the UAV with the highest trust value from the UAV swarm to authenticate with the ground control station (GCS). While ensuring the communication security, we reduce the energy consumption of UAV to the greatest extent, and reduce the frequent identity authentication between UAV and GCS. Through the security game verification under the random oracle model, it is proved that the proposed method can effectively resist some attacks, effectively reduce the computational overhead, and ensure the communication security of FANET. The results show that compared with the existing schemes, the proposed ATS-LIA scheme has lower computational overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Ismail A, Bagula BA , Tuyishimire E (2018) Internet-of-things in motion: A UAV coalition model for remote sensing in smart cities. Sensors 18(7)

  2. Xu C, Liao X, Tan J, Ye H, Lu H (2020) Recent research progress of unmanned aerial vehicle regulation policies and technologies in urban low altitude. IEEE Access 8:74175–74194. https://doi.org/10.1109/ACCESS.2020.2987622

    Article  Google Scholar 

  3. Shao Z, Cheng G, Ma J, Wang Z et al. Real-time and Accurate UAV pedestrian detection for social distancing monitoring in COVID-19 pandemic. IEEE Trans Multimed. https://doi.org/10.1109/TMM.2021.3075566

  4. Zhao J, Gao F, Ding G et al (2018) Integrating Communications and Control for UAV Systems: Opportunities and Challenges. IEEE Access 1–1

  5. Shafique A, Mehmood A, Elhadef M (2021) Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access 9:46927–46948. https://doi.org/10.1109/ACCESS.2021.3066778

    Article  Google Scholar 

  6. Vergouw B, Nagel H, Bondt G, Custers B (2016) Drone technology: types, payloads, applications. asser press, frequency spectrum issues and future developments. T.M.C

    Google Scholar 

  7. Saharan S, Bawa S, Kumar N (2019) Dynamic pricing techniques for Intelligent Transportation System in smart cities: A systematic review. Comput Commun 150

  8. Guo W, Devine C, Wang S (2014) Performance analysis of micro unmanned airborne communication relays for cellular networks. Int Symp Commun Syst 658–663

  9. Alsamhi SH, Ansari O, Ansari SM, Gupta SK (2019) Collaboration of drone and internet of public safety things in smart cities: An overview of QoS and network performance optimization. Drones

  10. Li W, Meese C, Guo H et al (2020) Blockchain-enabled identity verification for safe ridesharing leveraging zero-knowledge proof. CoRR 18–24

  11. Song L, Sun G, Yu H et al (2020) FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles. IEEE Trans Veh Technol 69(5):5403–5415

    Article  Google Scholar 

  12. Bayat M, Barmshoory M, Rahimi M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw

  13. He D, Ma M, Zhang Y et al (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374

    Article  Google Scholar 

  14. Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62(Feb.):1–8

    Article  Google Scholar 

  15. Gupta L, Jain R, Vaszkun G (2016) Survey of Important Issues in UAV Communication Networks. EEE Commun Surv Tutor 18(2):1123–1152

    Article  Google Scholar 

  16. Lin C, He D, Kumar N et al (2018) Security and privacy for the Internet of Drones: Challenges and solutions. IEEE Commun Mag 56(1):64–69

    Article  Google Scholar 

  17. Tian Y, Yuan J, Song H (2019) Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J Inf Secur Appl 48:102354

    Article  Google Scholar 

  18. Chen L, Qian S, Ming L et al (2018) An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems. China Commun 15(005):61–76

    Article  Google Scholar 

  19. Semal B, Markantonakis K, Akram RN (2018) A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC)

  20. Zhang Y, He D, Li L, Chen B (2020) A lightweight authentication and key agreement scheme for Internet of Drones. Comput Commun 154:455–464

    Article  Google Scholar 

  21. Gope P, Sikdar B (2020) An efficient privacy-preserving authenticated key agreement scheme for edge-assisted Internet of Drones. IEEE Trans Veh Technol

  22. Jangirala S, Das AK, Kumar N et al (2019) TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of Drones environment. IEEE Trans Veh Technol 1–1

  23. Wazid M, Das AK, Kumar N et al (2018) Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones Deployment. IEEE Internet Things J 1–1

  24. Yahuza M, Idris M, Wahab A et al (2021) An edge assisted secure lightweight authentication technique for safe communication on the Internet of Drones network. IEEE Access 99:1–1

    Google Scholar 

  25. Zhang N, Jiang Q, Li L et al (2021) An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones. Peer Peer Netw Appl 14(5):3319–3332

    Article  Google Scholar 

  26. Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. ACM Trans Sensor Netw 4(3, article 15):66–77

    Google Scholar 

  27. Liu YanB, Gong XueH, Feng YanF (2014) Trust evaluation method based on behavior detection of Internet of Things nodes. J Commun 35(005):8–15

    Google Scholar 

  28. Abderrahim OB, Elhdhili MH, Saidane L (2017) TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things. Wirel Commun Mob Comput Conf (IWCMC) 747–752

  29. Adewuyi AA, Cheng H, Shi Q, Cao J et al (2019) CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J 6(3):5432–5445. https://doi.org/10.1109/JIOT.2019.2902022

    Article  Google Scholar 

  30. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 361–396

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (61701170). Special project for key R & D and promotion of science and Technology Department of Henan Province (222102210052,222102210007,222102210062,222102210272)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sufang Zhou.

Ethics declarations

Conflict of interest

We declare that we have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Du, X., Li, Y., Zhou, S. et al. ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. Peer-to-Peer Netw. Appl. 15, 1979–1993 (2022). https://doi.org/10.1007/s12083-022-01330-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01330-7

Keywords