Abstract
With the rapid development of wireless communication and edge computing, UAV-assisted networking technology has great significance in many application scenarios such as traffic forecasting, emergency rescue, military reconnaissance. However, due to dynamic topology changes of Flying Ad-hoc Networks (FANET), frequent identity authentication is easy to cause the instability of communications between UAV nodes, which makes FANET face serious identity security threats. Therefore, it is an inevitable trend to build a secure and reliable FANET. In this paper, we propose a lightweight mutual identity authentication scheme based on adaptive trust strategy for Flying Ad-hoc Networks (ATS-LIA), which selects the UAV with the highest trust value from the UAV swarm to authenticate with the ground control station (GCS). While ensuring the communication security, we reduce the energy consumption of UAV to the greatest extent, and reduce the frequent identity authentication between UAV and GCS. Through the security game verification under the random oracle model, it is proved that the proposed method can effectively resist some attacks, effectively reduce the computational overhead, and ensure the communication security of FANET. The results show that compared with the existing schemes, the proposed ATS-LIA scheme has lower computational overhead.
Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Ismail A, Bagula BA , Tuyishimire E (2018) Internet-of-things in motion: A UAV coalition model for remote sensing in smart cities. Sensors 18(7)
Xu C, Liao X, Tan J, Ye H, Lu H (2020) Recent research progress of unmanned aerial vehicle regulation policies and technologies in urban low altitude. IEEE Access 8:74175–74194. https://doi.org/10.1109/ACCESS.2020.2987622
Shao Z, Cheng G, Ma J, Wang Z et al. Real-time and Accurate UAV pedestrian detection for social distancing monitoring in COVID-19 pandemic. IEEE Trans Multimed. https://doi.org/10.1109/TMM.2021.3075566
Zhao J, Gao F, Ding G et al (2018) Integrating Communications and Control for UAV Systems: Opportunities and Challenges. IEEE Access 1–1
Shafique A, Mehmood A, Elhadef M (2021) Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access 9:46927–46948. https://doi.org/10.1109/ACCESS.2021.3066778
Vergouw B, Nagel H, Bondt G, Custers B (2016) Drone technology: types, payloads, applications. asser press, frequency spectrum issues and future developments. T.M.C
Saharan S, Bawa S, Kumar N (2019) Dynamic pricing techniques for Intelligent Transportation System in smart cities: A systematic review. Comput Commun 150
Guo W, Devine C, Wang S (2014) Performance analysis of micro unmanned airborne communication relays for cellular networks. Int Symp Commun Syst 658–663
Alsamhi SH, Ansari O, Ansari SM, Gupta SK (2019) Collaboration of drone and internet of public safety things in smart cities: An overview of QoS and network performance optimization. Drones
Li W, Meese C, Guo H et al (2020) Blockchain-enabled identity verification for safe ridesharing leveraging zero-knowledge proof. CoRR 18–24
Song L, Sun G, Yu H et al (2020) FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles. IEEE Trans Veh Technol 69(5):5403–5415
Bayat M, Barmshoory M, Rahimi M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw
He D, Ma M, Zhang Y et al (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374
Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62(Feb.):1–8
Gupta L, Jain R, Vaszkun G (2016) Survey of Important Issues in UAV Communication Networks. EEE Commun Surv Tutor 18(2):1123–1152
Lin C, He D, Kumar N et al (2018) Security and privacy for the Internet of Drones: Challenges and solutions. IEEE Commun Mag 56(1):64–69
Tian Y, Yuan J, Song H (2019) Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J Inf Secur Appl 48:102354
Chen L, Qian S, Ming L et al (2018) An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems. China Commun 15(005):61–76
Semal B, Markantonakis K, Akram RN (2018) A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC)
Zhang Y, He D, Li L, Chen B (2020) A lightweight authentication and key agreement scheme for Internet of Drones. Comput Commun 154:455–464
Gope P, Sikdar B (2020) An efficient privacy-preserving authenticated key agreement scheme for edge-assisted Internet of Drones. IEEE Trans Veh Technol
Jangirala S, Das AK, Kumar N et al (2019) TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of Drones environment. IEEE Trans Veh Technol 1–1
Wazid M, Das AK, Kumar N et al (2018) Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of Drones Deployment. IEEE Internet Things J 1–1
Yahuza M, Idris M, Wahab A et al (2021) An edge assisted secure lightweight authentication technique for safe communication on the Internet of Drones network. IEEE Access 99:1–1
Zhang N, Jiang Q, Li L et al (2021) An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones. Peer Peer Netw Appl 14(5):3319–3332
Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. ACM Trans Sensor Netw 4(3, article 15):66–77
Liu YanB, Gong XueH, Feng YanF (2014) Trust evaluation method based on behavior detection of Internet of Things nodes. J Commun 35(005):8–15
Abderrahim OB, Elhdhili MH, Saidane L (2017) TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things. Wirel Commun Mob Comput Conf (IWCMC) 747–752
Adewuyi AA, Cheng H, Shi Q, Cao J et al (2019) CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J 6(3):5432–5445. https://doi.org/10.1109/JIOT.2019.2902022
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 361–396
Acknowledgements
This work was supported by National Natural Science Foundation of China (61701170). Special project for key R & D and promotion of science and Technology Department of Henan Province (222102210052,222102210007,222102210062,222102210272)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We declare that we have no conflict of interest.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Du, X., Li, Y., Zhou, S. et al. ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. Peer-to-Peer Netw. Appl. 15, 1979–1993 (2022). https://doi.org/10.1007/s12083-022-01330-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01330-7