| Literature DB >> 35669206 |
Xiaoyu Du1, Yinyin Li1,2, Sufang Zhou1, Yi Zhou3.
Abstract
With the rapid development of wireless communication and edge computing, UAV-assisted networking technology has great significance in many application scenarios such as traffic forecasting, emergency rescue, military reconnaissance. However, due to dynamic topology changes of Flying Ad-hoc Networks (FANET), frequent identity authentication is easy to cause the instability of communications between UAV nodes, which makes FANET face serious identity security threats. Therefore, it is an inevitable trend to build a secure and reliable FANET. In this paper, we propose a lightweight mutual identity authentication scheme based on adaptive trust strategy for Flying Ad-hoc Networks (ATS-LIA), which selects the UAV with the highest trust value from the UAV swarm to authenticate with the ground control station (GCS). While ensuring the communication security, we reduce the energy consumption of UAV to the greatest extent, and reduce the frequent identity authentication between UAV and GCS. Through the security game verification under the random oracle model, it is proved that the proposed method can effectively resist some attacks, effectively reduce the computational overhead, and ensure the communication security of FANET. The results show that compared with the existing schemes, the proposed ATS-LIA scheme has lower computational overhead.Entities:
Keywords: FANET; Mutual authentication; Random oracle model; Trust strategy; UAV
Year: 2022 PMID: 35669206 PMCID: PMC9135610 DOI: 10.1007/s12083-022-01330-7
Source DB: PubMed Journal: Peer Peer Netw Appl ISSN: 1936-6442 Impact factor: 3.488
Fig. 1VANET and FANET feature comparison and security requirements
Fig. 2System model
Fig. 3The system frame diagram of FANET
safety objectives of the design scheme
| Type | Describe |
|---|---|
| Identity privacy protection | UAVs, road stations, and malicious UAVs cannot obtain the UAV’s identity information from the communication messages |
| Message authentication and integrity | When the UAV communicates with the road station, both parties must be authenticated, so it can detect whether the message has been tampered with or fabricated |
| Traceability | The Trusted Center (TC) is the only institution that can know the identity of the UAV |
| Un-linkability | UAVs, road stations, and third-party participants cannot track UAVs by analyzing communication data because they cannot link and determine whether two messages are from the same UAV |
| Impersonation attack | This attack is mainly aimed at malicious UAVs forged into trusted UAVs to send fake messages |
| No certificate management | The complexity and cost of certificate management increase with the increase in the number of UAVs. In order to reduce the complexity of certificate verification and ensure the communication performance of the UAV, the solution needs to design certificateless management |
| Demonstrable safety | The program needs to use a widely recognized safety certification model for safety analysis |
Fig. 4Neighbor trust value aggregation process
Fig. 5The working diagram of the proposed authentication process
Fig. 6The GCS's working diagram of authentication process
Execution time of different encryption operations
| Encryption operation | Definition | Execution time (ms) |
|---|---|---|
| Bilinear pairing operation | 4.018 | |
| Bilinear correlation scalar multiplication operation | 1.209 | |
| Bilinear correlation addition operation | 0.0069 | |
| ECC related scalar multiplication operations | 0.419 | |
| ECC related addition operations | 0.0016 | |
| Cryptographic hashing | 0.003 |
Comparison of the calculation cost at each step
| Comparative literature | MSG | IA | Total |
|---|---|---|---|
| Bayat et al. scheme [ | |||
| Gope and Sikdar scheme [ | |||
| Tian et al. scheme [ | |||
| ATS-LIA scheme |
Fig. 7Communication time overhead diagram