当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications
Computer Communications ( IF 4.5 ) Pub Date : 2020-03-10 , DOI: 10.1016/j.comcom.2020.03.009
Yoney Kirsal Ever

Within the last decade, communication technologies have evolved rapidly, and this caused significant advancements for Internet of Things (IoT) applications and services. Unmanned aerial vehicles (UAVs), popularly known as drones, has attracted the interest of researches because of their fundamental attributes such as mobility, flexibility, reliability and energy efficiency in wireless networks. Similar to wireless sensor networks (WSNs) and other remote sensing applications, these devices are generally not designed with integrated security mechanisms. Furthermore, the existing solutions in which the main focus is on drone communication security are quite limited in the literature. Since the UAVs have the potential to handle very sensitive data, the exchange of information over wireless channels can cause serious exposures. The authentication schemes to be employed should be handled with care because of the limited resources and energy available with the sensor nodes. The existing enabling UAV technologies have restricted authentication privileges for their interaction with WSNs. In this paper, UAVs which can act like mobile-sinks are considered and existing work on WSN-UAV environment authentication is extended. A secure authentication framework using elliptic-curve crypto-systems is presented. The proposed framework is evaluated to ensure it is resilient to significant well-known potential attacks related with data confidentiality, mutual authentication, password guessing, and key impersonation.



中文翻译:

无人机互联网应用中使用的移动接收器的安全身份验证方案框架

在过去十年中,通信技术飞速发展,这导致了物联网(IoT)应用程序和服务的重大进步。无人驾驶飞机(UAV),通常称为无人机,由于其基本属性(例如,无线网络中的移动性,灵活性,可靠性和能效)而吸引了研究的兴趣。与无线传感器网络(WSN)和其他遥感应用类似,这些设备通常不设计为具有集成的安全机制。此外,在文献中仅以无人机通信安全为主要重点的现有解决方案非常有限。由于无人机具有处理非常敏感的数据的潜力,因此通过无线通道进行信息交换会导致严重的暴露。由于传感器节点可用的资源和能量有限,因此应谨慎处理要使用的身份验证方案。现有的启用无人机技术与WSN交互时具有受限的身份验证特权。在本文中,考虑了可以充当移动接收器的无人机,并扩展了有关WSN-UAV环境身份验证的现有工作。提出了使用椭圆曲线密码系统的安全认证框架。对提出的框架进行了评估,以确保它能够抵抗与数据机密性,相互身份验证,密码猜测和密钥模拟有关的重大已知潜在攻击。现有的启用无人机技术与WSN交互时具有受限的身份验证特权。本文考虑了可以充当移动接收器的无人机,并扩展了有关WSN-UAV环境身份验证的现有工作。提出了一种使用椭圆曲线密码系统的安全认证框架。对提出的框架进行了评估,以确保它能够抵抗与数据机密性,相互身份验证,密码猜测和密钥模拟有关的重大已知潜在攻击。现有的启用无人机技术与WSN交互时具有受限的身份验证特权。在本文中,考虑了可以充当移动接收器的无人机,并扩展了有关WSN-UAV环境身份验证的现有工作。提出了使用椭圆曲线密码系统的安全认证框架。对提出的框架进行了评估,以确保它能够抵抗与数据机密性,相互身份验证,密码猜测和密钥模拟有关的重大已知潜在攻击。

更新日期:2020-03-20
down
wechat
bug