Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication

For unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serve as relay nodes of air-based backup network to support transmission of rescue messages to emergency communication vehicles (ECVs), while ECVs provide on-site ground communication and connectivity...

Full description

Saved in:
Bibliographic Details
Main Authors: Wang, Di, Cao, Yue, Lam, Kwok-Yan, Hu, Yulin, Kaiwartya Omprakash
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/174189
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-174189
record_format dspace
spelling sg-ntu-dr.10356-1741892024-03-20T01:33:16Z Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication Wang, Di Cao, Yue Lam, Kwok-Yan Hu, Yulin Kaiwartya Omprakash School of Computer Science and Engineering Computer and Information Science Unmanned aerial vehicles Authentication For unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serve as relay nodes of air-based backup network to support transmission of rescue messages to emergency communication vehicles (ECVs), while ECVs provide on-site ground communication and connectivity to the command center (CC) of the rescue operation. Existing works seldom emphasize communication security such as authenticity of communicating parties and integrity of message content. In this connection, authentication and key agreement (AKA) protocols are promising solutions for achieving communication security. However, the traditional approaches to endpoint security and entity authentication of principals may not be practical in emergency situations, in which network equipment and security modules are exposed to an open and untrusted physical environment. Besides, there is a lack of attention to the study of privacy impacts resulted from the physical loss of UAVs. More importantly, cyber attacks and excessive overhead may deteriorate AKA availability. Motivated by above challenges, we propose an AKA protocol, namely AKAEC, which is based on three-factor (i.e. smart card, biometrics, and password) and physically unclonable function (PUF) for protecting UAVs-assisted emergency communication. Specifically, AKAEC includes ECV-to-UAV (E2U) and UAV-to-UAV (U2U), where the former achieves secure emergency communication between ECV and UAV, while the latter realizes secure emergency communication between UAV and UAV. We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. Finally, the performance of AKAEC is evaluated from communication overhead and computational overhead. Submitted/Accepted version 2024-03-20T01:33:15Z 2024-03-20T01:33:15Z 2024 Journal Article Wang, D., Cao, Y., Lam, K., Hu, Y. & Kaiwartya Omprakash (2024). Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication. IEEE Internet of Things Journal. https://dx.doi.org/10.1109/JIOT.2024.3371101 2327-4662 https://hdl.handle.net/10356/174189 10.1109/JIOT.2024.3371101 en IEEE Internet of Things Journal © 2024 IEEE. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Computer and Information Science
Unmanned aerial vehicles
Authentication
spellingShingle Computer and Information Science
Unmanned aerial vehicles
Authentication
Wang, Di
Cao, Yue
Lam, Kwok-Yan
Hu, Yulin
Kaiwartya Omprakash
Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
description For unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serve as relay nodes of air-based backup network to support transmission of rescue messages to emergency communication vehicles (ECVs), while ECVs provide on-site ground communication and connectivity to the command center (CC) of the rescue operation. Existing works seldom emphasize communication security such as authenticity of communicating parties and integrity of message content. In this connection, authentication and key agreement (AKA) protocols are promising solutions for achieving communication security. However, the traditional approaches to endpoint security and entity authentication of principals may not be practical in emergency situations, in which network equipment and security modules are exposed to an open and untrusted physical environment. Besides, there is a lack of attention to the study of privacy impacts resulted from the physical loss of UAVs. More importantly, cyber attacks and excessive overhead may deteriorate AKA availability. Motivated by above challenges, we propose an AKA protocol, namely AKAEC, which is based on three-factor (i.e. smart card, biometrics, and password) and physically unclonable function (PUF) for protecting UAVs-assisted emergency communication. Specifically, AKAEC includes ECV-to-UAV (E2U) and UAV-to-UAV (U2U), where the former achieves secure emergency communication between ECV and UAV, while the latter realizes secure emergency communication between UAV and UAV. We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. Finally, the performance of AKAEC is evaluated from communication overhead and computational overhead.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Wang, Di
Cao, Yue
Lam, Kwok-Yan
Hu, Yulin
Kaiwartya Omprakash
format Article
author Wang, Di
Cao, Yue
Lam, Kwok-Yan
Hu, Yulin
Kaiwartya Omprakash
author_sort Wang, Di
title Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
title_short Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
title_full Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
title_fullStr Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
title_full_unstemmed Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication
title_sort authentication and key agreement based on three factors and puf for uavs-assisted post-disaster emergency communication
publishDate 2024
url https://hdl.handle.net/10356/174189
_version_ 1794549492000751616