Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
For unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serve as relay nodes of air-based backup network to support transmission of rescue messages to emergency communication vehicles (ECVs), while ECVs provide on-site ground communication and connectivity...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/174189 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-174189 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1741892024-03-20T01:33:16Z Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication Wang, Di Cao, Yue Lam, Kwok-Yan Hu, Yulin Kaiwartya Omprakash School of Computer Science and Engineering Computer and Information Science Unmanned aerial vehicles Authentication For unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serve as relay nodes of air-based backup network to support transmission of rescue messages to emergency communication vehicles (ECVs), while ECVs provide on-site ground communication and connectivity to the command center (CC) of the rescue operation. Existing works seldom emphasize communication security such as authenticity of communicating parties and integrity of message content. In this connection, authentication and key agreement (AKA) protocols are promising solutions for achieving communication security. However, the traditional approaches to endpoint security and entity authentication of principals may not be practical in emergency situations, in which network equipment and security modules are exposed to an open and untrusted physical environment. Besides, there is a lack of attention to the study of privacy impacts resulted from the physical loss of UAVs. More importantly, cyber attacks and excessive overhead may deteriorate AKA availability. Motivated by above challenges, we propose an AKA protocol, namely AKAEC, which is based on three-factor (i.e. smart card, biometrics, and password) and physically unclonable function (PUF) for protecting UAVs-assisted emergency communication. Specifically, AKAEC includes ECV-to-UAV (E2U) and UAV-to-UAV (U2U), where the former achieves secure emergency communication between ECV and UAV, while the latter realizes secure emergency communication between UAV and UAV. We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. Finally, the performance of AKAEC is evaluated from communication overhead and computational overhead. Submitted/Accepted version 2024-03-20T01:33:15Z 2024-03-20T01:33:15Z 2024 Journal Article Wang, D., Cao, Y., Lam, K., Hu, Y. & Kaiwartya Omprakash (2024). Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication. IEEE Internet of Things Journal. https://dx.doi.org/10.1109/JIOT.2024.3371101 2327-4662 https://hdl.handle.net/10356/174189 10.1109/JIOT.2024.3371101 en IEEE Internet of Things Journal © 2024 IEEE. All rights reserved. |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Computer and Information Science Unmanned aerial vehicles Authentication |
spellingShingle |
Computer and Information Science Unmanned aerial vehicles Authentication Wang, Di Cao, Yue Lam, Kwok-Yan Hu, Yulin Kaiwartya Omprakash Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication |
description |
For unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serve as relay nodes of air-based backup network to support transmission of rescue messages to emergency communication vehicles (ECVs), while ECVs provide on-site ground communication and
connectivity to the command center (CC) of the rescue operation. Existing works seldom emphasize communication security such as authenticity of communicating parties and integrity of message content. In this connection, authentication and key agreement (AKA) protocols are promising solutions for achieving
communication security. However, the traditional approaches to endpoint security and entity authentication of principals may not be practical in emergency situations, in which network equipment and security modules are exposed to an open and untrusted physical environment. Besides, there is a lack of attention to the study of privacy impacts resulted from the physical loss of UAVs. More importantly, cyber attacks and excessive overhead may deteriorate AKA availability. Motivated by above challenges, we propose an AKA protocol, namely AKAEC, which is based on three-factor (i.e. smart card, biometrics, and password) and physically unclonable function (PUF) for protecting UAVs-assisted emergency communication. Specifically, AKAEC includes ECV-to-UAV (E2U) and UAV-to-UAV (U2U), where the former achieves
secure emergency communication between ECV and UAV, while the latter realizes secure emergency communication between UAV and UAV. We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. Finally, the performance of AKAEC is evaluated from communication overhead and computational overhead. |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Wang, Di Cao, Yue Lam, Kwok-Yan Hu, Yulin Kaiwartya Omprakash |
format |
Article |
author |
Wang, Di Cao, Yue Lam, Kwok-Yan Hu, Yulin Kaiwartya Omprakash |
author_sort |
Wang, Di |
title |
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication |
title_short |
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication |
title_full |
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication |
title_fullStr |
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication |
title_full_unstemmed |
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication |
title_sort |
authentication and key agreement based on three factors and puf for uavs-assisted post-disaster emergency communication |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/174189 |
_version_ |
1794549492000751616 |