Literature DB >> 35669206

ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks.

Xiaoyu Du1, Yinyin Li1,2, Sufang Zhou1, Yi Zhou3.   

Abstract

With the rapid development of wireless communication and edge computing, UAV-assisted networking technology has great significance in many application scenarios such as traffic forecasting, emergency rescue, military reconnaissance. However, due to dynamic topology changes of Flying Ad-hoc Networks (FANET), frequent identity authentication is easy to cause the instability of communications between UAV nodes, which makes FANET face serious identity security threats. Therefore, it is an inevitable trend to build a secure and reliable FANET. In this paper, we propose a lightweight mutual identity authentication scheme based on adaptive trust strategy for Flying Ad-hoc Networks (ATS-LIA), which selects the UAV with the highest trust value from the UAV swarm to authenticate with the ground control station (GCS). While ensuring the communication security, we reduce the energy consumption of UAV to the greatest extent, and reduce the frequent identity authentication between UAV and GCS. Through the security game verification under the random oracle model, it is proved that the proposed method can effectively resist some attacks, effectively reduce the computational overhead, and ensure the communication security of FANET. The results show that compared with the existing schemes, the proposed ATS-LIA scheme has lower computational overhead.
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.

Entities:  

Keywords:  FANET; Mutual authentication; Random oracle model; Trust strategy; UAV

Year:  2022        PMID: 35669206      PMCID: PMC9135610          DOI: 10.1007/s12083-022-01330-7

Source DB:  PubMed          Journal:  Peer Peer Netw Appl        ISSN: 1936-6442            Impact factor:   3.488


Introduction

In recent years, the development of the UAV industry has experienced explosive development. UAVs are more widely used in detectives, scientific research, smart cities [1], adventure rescue and other fields, bringing huge convenience to people's lives and production [2]. With the sudden outbreak of new coronavirus pneumonia in 2020, UAVs actively responded to the call and played a huge role [3], and the development and planning of the UAV industry also has ushered in new opportunities and challenges [4]. According to [5] statistics, it is estimated that by 2025, the global UAV market will reach 42.8 billion U.S. dollars, and it is estimated that by 2030, the global UAV market will reach 150 billion U.S. dollars. FANET has become a new development direction. An aerial network composed of dozens of UAVs can perform more complex flight missions in diverse scenarios. Both FANET and Internet of vehicles (VANET) are special categories of mobile ad hoc network (MANET), which are composed of some highly mobile nodes. The characteristics and security requirements are shown in Fig. 1. UAV network can be regarded as a subset of MANET and VANET, which is composed of mobile devices and on-board devices to solve point-to-point communication, but their only difference is moving in the air.
Fig. 1

VANET and FANET feature comparison and security requirements

VANET and FANET feature comparison and security requirements Both security and privacy are the main problems in FANET environments. Since the communication between UAVs is built on an open channel (radio propagation, WiFi, e.g.), malicious attacks often occur in such kind of networks. These will have a major impact on the privacy and safety of UAVs. In addition to the data collected by the UAV, malicious attackers will also be interested in the UAV's identity and flight path. In this way, malicious attackers obtain confidential data from UAVs and their monitoring facilities. In addition, the weight, energy, and communication technology of UAVs are the main factors affecting its services, such as communication methods, flight distance, flight endurance, load capacity, etc. [6, 7]. Specifically, the security and privacy issues mainly include the following aspects: The dynamic FANET is easy to cause a situation, which is data loss. Due to the relatively fast speed and relative movement speed of the UAV, the network topology of the UAV changes quickly. This causes serious data loss in the communication process, which has a great impact on the reliability and security of communication. UAVs have limited storage and computing power, as well as the energy they can carry. The complex encryption algorithm will increase the UAV's resource consumption and energy consumption, resulting in a long communication response time and affecting the performance of UAV communication. Therefore, it is necessary to allocate resources and energy reasonably and supplement them in time. There is no direct trust relationship between UAV nodes. Since the nodes in FANETs mainly communicate through the wireless transmission, the network is often interrupted and reconnected during the movement of UAV nodes. Therefore, attackers easily interfere with the network and obtain the data information transmitted between nodes. For the above security issues, the main contributions of this article are as follows: A credible computing scheme is designed in this paper. We aggregate the direct trust value, global trust value, and energy trust value of UAVs in the drone fleet into a comprehensive trust value. UAV representatives are selected from the drone fleet based on the comprehensive trust value. A lightweight security authentication scheme is designed in this paper, the scheme based on elliptic curve encryption algorithm to ensure the identity authentication of the representative UAV and road station. We uses a random oracle model to analyze the provable security. At the same time, we conducted an informal safety analysis. Through security analysis, we have judged the security performance of this solution and the attacks that can be resisted.

Related work

UAV is vulnerable to malicious factors when it performs specified tasks in the network.. In terms of privacy and security, such as network coverage [8], UAVs responsible for point-to-point traffic are vulnerable to data security threats, malicious attacks, and interference [9]. In terms of communication, malicious UAVs use a specific bandwidth of the air network to perform frequency interference on the system's secure channel to intercept UAV data. Most of the existing solutions are mainly based on the ideas of Ad Hoc or Internet of Vehicles security networking [10-12]. However, due to the highly dynamic mobility of UAVs, the security threats it faces are even more special. The safety and privacy of UAVs have also attracted more and more attention. He et al. [13] proposed an enhanced anonymous user authentication and key agreement scheme for roaming in a global environment, security analysis shows that this solution has important security attributes such as prevention of various attacks, single registration, user anonymity, and high password authentication efficiency. In the literature [14], the author's scheme provides a key agreement for the global mobile network environment and ensures the security and fairness of communication. This has contributed to the research on UAV communication and privacy security. In [15], the authors proposed a software-defined network (SDN) that can facilitate the flexible deployment and management of new services, which helps reduce costs and improve network security and availability. Finally, the author gave a comprehensive description of the problems of FANET security. In [16], the author mainly studied the security and privacy of FANET architecture, and outlines potential solutions to these challenging problems, such as privacy leakage, data confidentiality protection, and flexible accessibility, etc. In [17], the author proposed a certificate-based privacy protection authentication scheme to protect FANET. The scheme realizes the privacy protection of UAV identity, location, and flight route. The author also proved the feasibility of this scheme in terms of security, privacy, and efficiency through in-depth analysis. Chen et al. [18] and Semal et al. [19] proposed a mutual authentication scheme for FANET deployment based on asymmetric bilinear pairing. The purpose is to achieve confidentiality, information integrity and authenticity in UAV-to-UAV communication. Zhang et al. [20] proposed a lightweight authentication scheme for FANETs. When UAVs and users authenticate each other, only a secure one-way hash function and odor operation can resist various attacks. Gope and Sikdar [21] pointed out that the scheme of Zhang et al. is insecure against forgery attacks. The attacker can intercept the first message between the user and the control server. The attacker modifies the timestamp so that the control server cannot recognize the message. The scheme proposed by the author in [22] is also vulnerable to the above-mentioned similar attacks. Wazid et al. [23] also proposed a new type of lightweight authentication scheme. When users want to access UAV data, they need to apply for authorization to achieve the security verification of users and UAVs. But Wazid et al. only used fuzzy extractors and hash functions. Although they have lightweight features, the authentication protocol is vulnerable to session-specific temporary information attacks. Yahuza et al. [24] and Zhang et al. [25] proposed a secure and lightweight authentication key agreement technology for FANET deployment, and evaluated the security of the technology from theoretical methods and formal methods. Although these authors have proposed data privacy protection schemes for UAVs, they have not solved their privacy security issues based on the special network environment of UAVs. Moreover, these solutions still cannot solve the problems of UAV communication delay and complicated calculation. In order to ensure the security identity of drones from the source, we can conduct credibility assessments in the drone fleet. Therefore, a Bayes-based reputation management model was proposed in the literature [26]. This model obtains the comprehensive trust value of the node through the global trust iteration method, which improves the trust convergence speed, but increases the energy consumption of trust calculation. In order to reduce the energy consumption of trust computing, the literature [27] combines historical trust value of nodes, the statistical trust value and direct trust value to calculate the comprehensive trust value of nodes to balance the subjective and objective nature of trust. The literature also proposes a method for evaluating the trust degree of the Internet of Things based on node behavior. Some scholars introduce social relationships into the trust evaluation model to fully mine the trust relationship between node and node [28, 29]. In order to design an effective and credible FANET authentication framework with privacy protection capabilities, it is necessary to consider the following aspects. First, in order to reduce the communication overhead, which is caused by the simultaneous identity authentication of multiple UAVs in FANET, it is necessary to select a representative UAV and the GCS for one-to-one authentication. Secondly, since UAVs usually have resource constraints in terms of computing and energy, the identity authentication scheme must be lightweight. Finally, the designed scheme must protect the privacy of UAVs.

System model

FANET model

FANET mainly includes drone fleet, ground control station (GCS), and trusted center (TC). The drone fleet needs to select the representative UAV (RUAV) with the highest trust value. The drone fleet and the GCS have communication tasks, so a two-way identity authentication is required. Their mutual authentication needs to rely on the storage and verification of their private identity information by the trusted center. After the UAV and the road station are successfully authenticated, the UAV receives the message from the road station and executes the message task. Figure 2 shows the scene and relationship diagram of FANET.
Fig. 2

System model

System model The main functions are: UAV: Every UAV is equipped with communication equipment, which can communicate with UAV and road station in real time. Trusted Center (TC): TC is trusted by all nodes of the UAV system and has sufficient computing, communication, and storage capabilities. TC is also responsible for generating system parameters and registering UAVs and GCSs. Ground Control Station (GCS): The GCS is an infrastructure that is deployed on the side of the road or is a movable man-operated infrastructure. Before the GCS establishes a call with the UAV, the identity information must be authenticated. When UAVs perform tasks, they usually perform collaborative operations within the UAV fleet. Therefore, there will be situations where the drone fleet and the GCS initiate an identity authentication request at the same time.

Trust management method

This article makes the following presuppositions for the trust value calculation management model adopted: The UAV fleet network environment has been running for a period, and a moderate amount of interaction experience has been accumulated among UAVs; The position of each UAV in the UAV fleet is fixed, that is, the adjacent nodes are also determined. Therefore, the node has formed a relatively stable "circle of acquaintances" according to the historical interaction degree of the UAV. In the trust value evaluation stage, the status of each drone node in the drone network is equal, and they must evaluate each other after each task is executed; All UAV nodes in the system can be considered as cooperative nodes, and there are no uncooperative nodes that do not provide services or provide evaluation. Here, malicious UAVs are also cooperative nodes. We first evaluate the reputation of the UAV in the drone fleet. The direct trust value, global trust value, and energy trust value of each UAV are evaluated through the historical communication records of the UAV nodes. We comprehensively calculate the three types of trust values to obtain the comprehensive trust value of each UAV. Due to the energy limitation of the UAV, when the energy of the UAV is greater than the energy threshold, we evaluate the reputation of the UAV. Otherwise, we will kick the UAV out of the fleet for energy replenishment. The system selects the UAV with the highest reputation value through the UAV trust list as RUAV, which represents the real-time communication between the drone fleet and GCS. Figure 3 shows the system frame diagram of FANET in this scheme.
Fig. 3

The system frame diagram of FANET

The system frame diagram of FANET

ATS-LIA scheme

This paper proposes an identity protection scheme based on trusted UAVs. This section mainly introduces the scheme in detail. The program is mainly divided into four parts, which are security goals, the most trusted UAV selection, the privacy protection of the UAV's identity, and the identity privacy protection of the GCS. The choice of the most trusted UAV is mainly based on the UAV's local trust value, global trust value, capability trust value and comprehensive trust value. The identity privacy protection scheme mainly includes system initialization, anonymous identity setting, message signature and message authentication.

Security requirements

We make the following assumptions based on the characteristics of FANET system in reality: The Trusted Center (TC) in FANET is completely credible; The communications of UAV–to-UAV and UAV–to-GCS is spread on open propagation channels, so it is very likely to be attacked by a wide range of attackers. Table 1 is the security goal of the trusted FANET designed in this paper.
Table 1

safety objectives of the design scheme

TypeDescribe
Identity privacy protectionUAVs, road stations, and malicious UAVs cannot obtain the UAV’s identity information from the communication messages
Message authentication and integrityWhen the UAV communicates with the road station, both parties must be authenticated, so it can detect whether the message has been tampered with or fabricated
TraceabilityThe Trusted Center (TC) is the only institution that can know the identity of the UAV
Un-linkabilityUAVs, road stations, and third-party participants cannot track UAVs by analyzing communication data because they cannot link and determine whether two messages are from the same UAV
Impersonation attackThis attack is mainly aimed at malicious UAVs forged into trusted UAVs to send fake messages
No certificate managementThe complexity and cost of certificate management increase with the increase in the number of UAVs. In order to reduce the complexity of certificate verification and ensure the communication performance of the UAV, the solution needs to design certificateless management
Demonstrable safetyThe program needs to use a widely recognized safety certification model for safety analysis
safety objectives of the design scheme

Selection of RUAV

The main influencing factors of the direct trust value of each UAV in the drone fleet are: the relevance of data transmission, the sending rate of data packets, the freshness of data, and the successful delivery rate of packets. The entity trust of UAVs is mainly judged by the quality scores of other UAVs in the UAV group and the credibility of the scores. The comprehensive trust value of UAV is mainly composed of local trust value, global trust value and energy trust value. The trust value is calculated as follows: Local trust value In the process of judging the data of ( The i-th UAV), we mainly judge the task instructions received from RUAV as the receiver and the shared information received by RUAV from other member UAVs. The shared information mainly includes the location of the UAV, the flying speed of the UAV, and the flying direction of the UAV. We mark the received shared information of ( The j-th UAV)as , and mark the flight status information of as perceived by as . The perceives the data information of and the shared information of in a one-to-one correspondence. We calculate the error result of the same variable of the two data sets to get the error set , where . In the following sigmoid function, represents the influence weight of various shared information on the overall trust value, is the threshold of the model, and t represents the hovering time. In this function, the input is each value in the corresponding error set , and the output is trust value evaluation result of to transmission information, which is calculated as: Global trust value The global trust value is mainly judged based on the quality of the mission performed by the UAV. The judgment basis is mainly the trust value of the judged UAV provided by neighbor nodes. The set of neighbor nodes is represented by , where , k represents the number of neighbor nodes, n represents the total number of UAVs. Figure 4 shows the aggregation process of the trust value of neighbor nodes.
Fig. 4

Neighbor trust value aggregation process

Neighbor trust value aggregation process The mission execution quality of the UAV is expressed as: where represents the trusted public neighbor node of and , represents the direct trust value of to , and represents the direct trust value of to . The global trust value of the UAV is expressed as: Energy trust value The energy consumption of UAV is mainly determined by the flight distance and flight time. We assume that flies in a straight line at a uniform speed of v, the influence of the flight distance of on flight energy consumption is calculated as: . The energy consumption of when hovering is: . Among them, represents the power when the is flying at the speed v, and represents the power when the flying height is h at the hovering time t. Therefore, the energy trust value of the UAV can be obtained as: Comprehensive trust value We have considered the data security, entity trust and energy consumption of UAV nodes, and the comprehensive trust value formula of is as follows:where . To prevent the previous malicious behavior from being forgotten by the UAV, we introduce the activation factor , so that the previous bad behavior of the will be strongly remembered, and it will take a long time to establish a new trust next time.

Identity authentication

The authentication scheme based on anonymous identity of UAV is shown in Fig. 5, and the specific steps are as follows:
Fig. 5

The working diagram of the proposed authentication process

Identity authentication scheme of UAV Step 1 System initialization phase The working diagram of the proposed authentication process Given a system parameter , TC generates a prime number q and a elliptic curve group G of order q, where g is the generator of G. TC also chooses 4 cryptographic hash functions , of which , , , . TC chooses a random number and sets . a is the master key that only TC knows to extract the private key. TC chooses a random number and sets , b is the traceable master key that only TC knows. TC announces system parameters . Step 2 Anonymous Identity Setting A legal transmits the real identity to TC, and after confirming that the identity is valid, TC selects a set of private random numbers and calculates the public key , where and . TC generates a set of pseudo-identities , , and for . The real ID of the UAV is hidden in the . After calculating , TC calculates the private key , where , . TC sends the system parameters Params and to . Step 3 UAV message signature selects a private key , a corresponding public key and pseudo-identity from , , and respectively. selects a random number and calculates , , and , where represents the current timestamp that supports the freshness of the valid signature message. sends a signed message to a nearby GCS. Step 4 UAV authentication When receiving the signed by , the receiver checks the freshness of the timestamp . If is not fresh, the receiver deletes the message. If is fresh and effective, the receiver (RUAV) will calculate and , and then verify whether the formula is valid. The theoretical basis is as follows: Identity authentication scheme of GCS The authentication scheme of GCs is shown in Fig. 6, and the specific steps are as follows:
Fig. 6

The GCS's working diagram of authentication process

Step 1 Identity generation and key extraction of GCS Given of the GCS, the trusted center TC selects a set of random numbers and calculates the corresponding public value , where , . TC calculates the private key of GCS, where and . TC sends Params and to GCS through a secure transmission channel, and GCS stores all its private keys and its corresponding representation in the system memory. The GCS's working diagram of authentication process Step 2 The message signature of GCS When GCS broadcast’s location information to UAVs in range, the signature of command message issued by GCS is as follows: GCS selects a private key and corresponding public key from and respectively, and selects a random number to calculate , , and , where is the timestamp of the current time. The GCS broadcasts the signature information . Step 3 The UAV verifies the identity information of GCS After the UAV receives the signature message sent by the GCS, checks the freshness of the timestamp , if it is not fresh, deletes the information; otherwise, the road area station is authenticated If the timestamp is fresh, calculate and to determine whether is established. If the equation is established, receives the task instruction message from GCS.

Security analysis

The definition of security for our proposed solution is given by a game executed between a polynomial-time adversary and a challenger .The game process is as follows: Setup: The challenged person generates the system private key and public parameter params, and sends the params to . Query: creates an initially empty list , and the tuple is stored in , where . and conduct the following query game. : In this query, chooses a random number , inserts tuple into table , and returns to . : In this query, when inputs information about the UAV mission information , generates forged signature information .

Provable security of ATS-LIA

Definition

If the advantage of function is negligible for any polynomial adversary , then the ATS-LIA scheme in this paper is used for UAV chosen-identity and chosen-message secure security. is defined as the advantage of adversary in destroying the identity authentication scheme designed in this paper. According to definition, the identity, and messages security with random oracles for the presented ATS-LIA scheme is argued as shown below.

Theorem

Assuming that the discrete logarithm problem (ECDLP) is difficult to solve, the authentication scheme proposed in this paper is secure in random language and model.

Proof

Assuming polynomial time adversary can forge a message , then can execute the forged message of as a sub-project to solve ECDLP. Assuming that is an instance of ECDLP, the purpose of is to calculate a. obtains the system params , and follows the request of and performs the following query. : is maintained as a tuple in the list which is initialized to be empty. When receiving a request from to query , queries whether tuple is in list . If this tuple exists in the list, calculates and returns to . Otherwise, chooses a random , calculates , sends to and adds to . : is maintained as a tuple in the list which is initialized to be empty. When receiving a request from to query , queries whether tuple is in list . If this tuple exists in the list, then calculates and returns to . Otherwise, chooses a random , calculates , sends to and adds to . : is maintained as a tuple in the list which is initialized to be empty. When receiving a request from to query , queries whether tuple is in list . If this tuple exists in the list, then calculates and returns to . Otherwise, chooses a random , and calculates , sends to and adds to . : is maintained as a tuple in the list which is initialized to be empty. When receiving a request from to query , queries whether tuple is in list . If this tuple exists in the list, then calculates and returns to . Otherwise, chooses a random , and calculates , sends to and adds to . : When receives a request from that contains a message and an anonymous identity , chooses a random number and calculates and . stores in , and stores in , and then sends the signature information to . is easy to verify Eq. (6): If the equation does not hold, interrupts the game, otherwise through the bifurcation principle [30], only changes to repeat the above query process, can obtain a new , so it is easy to get the Eq. (8): Through Eqs. (7) and (8), we can get: Through Eq. (10), we can get: According to Eq. (11), outputs . This contradicts the difficulty of the ECDLP problem. Therefore, under the random oracle model, the privacy protection scheme based on anonymity proposed in this paper is safe under adaptive message selection attacks.

Security and attributes analysis

Message identity authentication

According to the theorem, we can analyze and get that based on the difficulty of the ECDLP problem, no polynomial opponent can forge a valid message. The receiver can easily verify the integrity of the message from the sender through a formula . Therefore, the attacker cannot obtain the signature information of the UAV, and thus cannot generate legal information.

Privacy protection

The real identity of the UAV proposed in this paper is related to its anonymous identity , , and . To find the true-identity of the UAV, the attacker needs to calculate , where , . However, due to the difficulty of ECDLP, the attacker cannot calculate . Therefore, the ATS-LIA scheme proposed in this paper can protect the privacy of the UAV's identity.

Traceability

The real identity of the UAV proposed in this paper is related to its anonymous identity , . Through the private key of the system, TC can calculate the real identity of the UAV. Therefore, the solution proposed in this paper provides traceability functions.

Un-linkability

UAV generates ,, , , . Due to the randomness of and , the attacker cannot find the correlation from the random information generated each time, so it is impossible to determine whether it is a message sent by the same UAV. Therefore, the solution proposed in this paper achieves non-connectivity.

Modification attack

The UAV will broadcast message to GCS. It is easy for an attacker to modify the information which eavesdropped on from the wireless communication channel. If the message sent by the UAV to the GCS is modified, we will verify whether the formula is satisfied according to and based on the theorem, so that the broadcast information is found to be untrue. Therefore, the solution proposed in this paper can resist message modification attacks.

Impersonation attack

To impersonate the identity of a GCS or UAV, the attacker must have a legal message and must pass verification . According to the theorem, it is difficult for an attacker to generate a legally signed message. UAVs and GCSs can easily detect whether the sender is being impersonated by the above equation. Therefore, the ATS-LIA scheme proposed in this paper can resist impersonation attacks.

Replay attack

The timestamp of the scheme proposed in this paper is contained in . Because of signature , also contains a timestamp. UAVs and GCSs can easily determine whether the message is rebroadcast by verifying the freshness of the timestamp. Therefore, the solution proposed in this paper can resist replay attacks.

Man-in-the-middle attack

This solution provides identity authentication for UAVs and GCSs during their communication. Therefore, the ATS-LIA scheme proposed in this paper can resist man-in-the-middle attacks.

The checklist is stolen attack

Neither the UAV nor the GCS maintains a validator table for authentication, so they only need to store their private key. The attacker cannot steal any verification form for malicious attacks. Therefore, the solution proposed in this paper can resist the attack of checklist theft.

Implement analysis

In this section, we will analyze the performance of the identity based ATS-LIA scheme proposed for UAVs. It is mainly divided into two parts, including analysis computation cost and communication cost. We mainly analyze the computational overhead of the identity-based privacy protection scheme in the UAV self-organizing network. We mainly calculate the computational overhead consumed in the message signature generation and message authentication phases. Compared with the Internet of Vehicles and sensor networks, the UAV self-organizing network has similar characteristics. Therefore, this paper mainly compares the schemes adopted by Bayat et al. [12], Gope and Sikdar [21], and Tian et al. [17]. In order to make a fair comparison, we use the famous password library MIRACL to calculate the execution time of password operations. We calculate the encryption time in the following environment: on a desktop computer with Intel (R) core (TM) i5-8500 CPU, frequency of 3.00 GHz and 8 GB RAM. Table 2 lists the symbol settings for the above operations and the average time required. Table 3 shows the calculation cost comparison of each step of these three schemes and the total calculation cost comparison.
Table 2

Execution time of different encryption operations

Encryption operationDefinitionExecution time (ms)
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{p}$$\end{document}TpBilinear pairing operation4.018
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{m}$$\end{document}TmBilinear correlation scalar multiplication operation1.209
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{a}$$\end{document}TaBilinear correlation addition operation0.0069
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{m - ecc}$$\end{document}Tm-eccECC related scalar multiplication operations0.419
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{a - ecc}$$\end{document}Ta-eccECC related addition operations0.0016
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{h}$$\end{document}ThCryptographic hashing0.003
Table 3

Comparison of the calculation cost at each step

Comparative literatureMSGIATotal
Bayat et al. scheme [12]\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$5T_{m} + T_{h} \approx 6.048ms$$\end{document}5Tm+Th6.048ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3T_{p} + T_{a} \approx 12.0609ms$$\end{document}3Tp+Ta12.0609ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Total \approx 18.1089ms$$\end{document}Total18.1089ms
Gope and Sikdar scheme [21]\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{m} { + }T_{a} + T_{h} \approx 1.2189ms$$\end{document}Tm+Ta+Th1.2189ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{p} + T_{m} + 2T_{h} \approx 5.233ms$$\end{document}Tp+Tm+2Th5.233ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Total \approx {6}{\text{.4529}}ms$$\end{document}Total6.4529ms
Tian et al. scheme [17]\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{m} { + }T_{a} + T_{h} \approx 1.2189ms$$\end{document}Tm+Ta+Th1.2189ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{p} + {2}T_{m} + 2T_{h} \approx {6}{\text{.442}}ms$$\end{document}Tp+2Tm+2Th6.442ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Total \approx {7}{\text{.6609}}ms$$\end{document}Total7.6609ms
ATS-LIA scheme\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{m - ecc} + 2T_{h} \approx 0.426ms$$\end{document}Tm-ecc+2Th0.426ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${3}T_{m - ecc} + T_{a - ecc} + 2T_{h} \approx 1.2646ms$$\end{document}3Tm-ecc+Ta-ecc+2Th1.2646ms\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Total \approx 1.6906ms$$\end{document}Total1.6906ms
Execution time of different encryption operations Comparison of the calculation cost at each step This section mainly compares the time cost of the UAV message signature generation (MSG) phase and the UAV identity authentication (IA) phase verification. For the NEAS scheme adopted by Bayat et al. in the MSG stage, there are mainly five bilinear correlation scalar multiplication operations and a hash function . In the IA stage, there are three bilinear pairing operations and one bilinear pair addition operation, which is calculated as . The total computational cost is . For the scheme adopted by Gope and Sikdar, in the MSG phase, there are mainly a bilinear correlation scalar multiplication operation, a bilinear correlation addition operation and a hash function . In the IA phase, it is mainly a bilinear pairing operation, a bilinear correlation scalar multiplication operation and two hash functions, which are calculated as . The total computational cost is . The scheme adopted by Tian et al. in the MSG stage, mainly a bilinear correlation scalar multiplication operation, a bilinear correlation addition operation and a hash function, which are calculated as . In the IA phase, it is mainly a bilinear pairing operation, two bilinear correlation scalar multiplication operations and two hash functions, which are calculated as . The total computational cost is . The scheme adopted in this paper is mainly based on an elliptic curve correlation scalar multiplication and two cryptographic hash functions in the MSG process, so the computational cost is . In the IA stage, there are mainly four scalar multiplication operations based on elliptic curves, one addition operation based on elliptic curves, and two encrypted hash functions, so the computational cost is . The total computational cost is . It can be seen from Fig. 7 that in the MSG, the program designed in this paper has an increase of about 92.96% in the time percentage of Bayat et al. program, and an increase of 65.05% in the time percentage of the program compared with Gopeand Sikdar and Tian et al. In the IA, the time percentages of the ATS-LIA scheme designed in this paper are about 89.51%, 75.83%, and 80.37% higher than those of Bayat et al., Gope and Sikdar, and Tian et al. The total time cost of our program is 90.66% higher than that of Bayat et al. the percentage of time is about 73.80% higher than that of Gope and Sikdar, and the percentage of time is about 77.93% higher than that of Tian et al.
Fig. 7

Communication time overhead diagram

Communication time overhead diagram The size of the element in which we selected in this paper is 40 bits, and the size of the output and timestamp of the general hash function are 20 bits and 4 bits respectively. Therefore, in this paper, the UAV sends to GCS, where and are the hash operation results and t is the timestamp. In all identity-based authentication schemes, the messages about the instruction status are similar, so this paper does not calculate the with instructions transmitted by UAV. Thus, the communication overhead is calculated as: bits.

Conclusion

As the application of UAVs becomes more and more widespread, it has also received more and more attention in the industry and academia. For the particularity of FANETs, this paper proposes a trust-based identity authentication scheme of UAV. Compared with other solutions, we consider the communication overhead of drone fleet certification, and choose the most credible representative UAV in the drone fleet to establish a communication link with the ground station. It can avoid the potential safety hazards caused by UAV nodes because of their moving speed fast and frequent access to the network. At the same time, this scheme designs two-way authentication based on elliptic curve for UAV and road station, which ensures that the authentication scheme is lightweight. Through the random oracle model, it is proved that the scheme proposed in this paper can resist various attacks. By comparison, the computational cost of this solution is also competitive.
  2 in total

1.  Real-Time and Accurate UAV Pedestrian Detection for Social Distancing Monitoring in COVID-19 Pandemic.

Authors:  Zhenfeng Shao; Gui Cheng; Jiayi Ma; Zhongyuan Wang; Jiaming Wang; Deren Li
Journal:  IEEE Trans Multimedia       Date:  2021-04-28       Impact factor: 8.182

2.  Internet-Of-Things in Motion: A UAV Coalition Model for Remote Sensing in Smart Cities.

Authors:  Adiel Ismail; Bigomokero Antoine Bagula; Emmanuel Tuyishimire
Journal:  Sensors (Basel)       Date:  2018-07-06       Impact factor: 3.576

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.