scholarly journals Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

Drones ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 10
Author(s):  
Tsu-Yang Wu ◽  
Xinglan Guo ◽  
Yeh-Cheng Chen ◽  
Saru Kumari ◽  
Chien-Ming Chen

At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zeeshan Ali ◽  
Bander A. Alzahrani ◽  
Ahmed Barnawi ◽  
Abdullah Al-Barakati ◽  
Pandi Vijayakumar ◽  
...  

In smart cities, common infrastructures are merged and integrated with various components of information communication and technology (ICT) to be coordinated and controlled. Drones (unmanned aerial vehicles) are amongst those components, and when coordinated with each other and with the environment, the drones form an Internet of Drones (IoD). The IoD provides real-time data to the users in smart cities by utilizing traditional cellular networks. However, the delicate data gathered by drones are subject to many security threats and give rise to numerous privacy and security issues. A robust and secure authentication scheme is required to allow drones and users to authenticate and establish a session key. In this article, we proposed a provably secure symmetric-key and temporal credential-based lightweight authentication protocol (TC-PSLAP) to secure the drone communication. We prove that the proposed scheme is provably secure formally through the automated verification tool AVISPA and Burrows–Abadi–Needham logic (BAN logic). Informal security analysis is also performed to depict that the proposed TC-PSLAP can resist known attacks.


Author(s):  
Wendy W. Fok ◽  

Minerva Tantoco was named New York City’s first chief technology officer last year, charged with developing a coordinated citywide strategy on technology and innovation. We’re likely to see more of that as cities around the country, and around the world, consider how best to use innovation and technology to operate as “smart cities.”The work has major implications for energy use and sustainability, as cities take advantage of available, real-time data – from ‘smart’ phones, computers, traffic monitoring, and even weather patterns — to shift the way in which heating and cooling systems, landscaping, flow of people through cities, and other pieces of urban life are controlled. But harnessing Open Innovation and the Internet of Things can promote sustainability on a much broader and deeper scale. The question is, how do you use all the available data to create a more environmentally sound future? The term “Internet of Things” was coined in 1999 by Kevin Ashton, who at the time was a brand manager trying to find a better way to track inventory. His idea? Put a microchip on the packaging to let stores know what was on the shelves.


2019 ◽  
Vol 15 (11) ◽  
pp. 155014771988884 ◽  
Author(s):  
Tayyaba Zaheer ◽  
Asad Waqar Malik ◽  
Anis Ur Rahman ◽  
Ayesha Zahir ◽  
Muhammad Moazam Fraz

Smart cities and the Internet of Things have enabled the integration of communicating devices for efficient decision-making. Notably, traffic congestion is one major problem faced by daily commuters in urban cities. In developed countries, specialized sensors are deployed to gather traffic information to predict traffic patterns. Any traffic updates are shared with the commuters via the Internet. Such solutions become impracticable when physical infrastructure and Internet connectivity are either non-existent or very limited. In case of developing countries, no roadside units are available and Internet connectivity is still an issue in remote areas. In this article, we propose an intelligent vehicular network framework for smart cities that enables route selection based on real-time data received from neighboring vehicles in an ad hoc fashion. We used Wi-Fi Direct–enabled Android-based smartphones as embedded devices in vehicles. We used a vehicular ad hoc network to implement an intelligent transportation system. Data gathering and preprocessing were carried on different routes between two metropolitan cities of a developing country. The framework was evaluated on different fixed route-selection and dynamic route-selection algorithms in terms of resource usage, transmission delay, packet loss, and overall travel time. Our results show reduced travel times of up to 33.3% when compared to a traditional fixed route-selection algorithm.


2020 ◽  
Vol 12 (4) ◽  
pp. 63
Author(s):  
Nishu Gupta ◽  
Ravikanti Manaswini ◽  
Bongaram Saikrishna ◽  
Francisco Silva ◽  
Ariel Teles

The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies that better explain about traffic efficiency and their management applications. IoV architecture is seen as a big player in different areas such as the automobile industry, research organizations, smart cities and intelligent transportation for various commercial and scientific applications. However, as VANET is vulnerable to various types of security attacks, the IoV structure should ensure security and efficient performance for vehicular communications. To address these issues, in this article, an authentication-based protocol (A-MAC) for smart vehicular communication is proposed along with a novel framework towards an IoV architecture model. The scheme requires hash operations and uses cryptographic concepts to transfer messages between vehicles to maintain the required security. Performance evaluation helps analyzing its strength in withstanding various types of security attacks. Simulation results demonstrate that A-MAC outshines other protocols in terms of communication cost, execution time, storage cost, and overhead.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Ruhul Amin ◽  
SK Hafizul Islam ◽  
Muhammad Khurram Khan ◽  
Arijit Karati ◽  
Debasis Giri ◽  
...  

The concept of two-factor multiserver authentication protocol was developed to avoid multiple number of registrations using multiple smart-cards and passwords. Recently, a variety of two-factor multiserver authentication protocols have been developed. It is observed that the existing RSA-based multiserver authentication protocols are not suitable in terms of computation complexities and security attacks. To provide lower complexities and security resilience against known attacks, this article proposes a two-factor (password and smart-card) user authentication protocol with the RSA cryptosystem for multiserver environments. The comprehensive security discussion proved that the known security attacks are eliminated in our protocol. Besides, our protocol supports session key agreement and mutual authentication between the application server and the user. We analyze the proof of correctness of the mutual authentication and freshness of session key using the BAN logic model. The experimental outcomes obtained through simulation of the Automated Validation of Internet Security Protocols and Applications (AVISPA) S/W show that our protocol is secured. We consider the computation, communication, and storage costs and the comparative explanations show that our protocol is flexible and efficient compared with protocols. In addition, our protocol offers security resilience against known attacks and provides lower computation complexities than existing protocols. Additionally, the protocol offers password change facility to the authorized user.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Chien-Ming Chen ◽  
Shuangshuang Liu

The Internet of Things (IoT) is a huge network formed by connecting various information sensing devices through the Internet. Although IoT has been popularized in many fields, connected devices can be used only when network security is guaranteed. Recently, Rana et al. proposed a secure and lightweight authentication protocol for the next-generation IoT infrastructure. They claim that their protocol can resist major security attacks. However, in this study, we prove that their protocol is still vulnerable to offline password guessing attacks and privilege internal attacks. In order to solve these shortcomings, we propose an improved protocol, which is proved to be secure by formal and informal analysis. In addition, after comparing the time and memory consumption with other protocols, we find that our protocol has more advantages.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Tsu-Yang Wu ◽  
Xinglan Guo ◽  
Lei Yang ◽  
Qian Meng ◽  
Chien-Ming Chen

Recently, there has been rapid growth in the Internet of things, the Internet of vehicles, fog computing, and social Internet of vehicles SIoV , which can generate large amounts of real-time data. Now, researchers have begun applying fog computing to the SIoV to reduce the computing pressure on cloud servers. However, there are still security challenges in SIoV . In this paper, we propose a lightweight and authenticated key agreement protocol based on fog nodes in SIoV . The protocol completes the mutual authentication between entities and generates the session key for subsequent communication. Through a formal analysis of the Burrows–Abadi–Needham (BAN) logic, real-oracle random (ROR) model, and ProVerif, the security, validity, and correctness of the proposed protocol are demonstrated. In addition, informal security analysis shows that our proposed protocol can resist known security attacks. We also evaluate the performance of the proposed protocol and show that it achieves better performance in terms of computing power and communication cost.


2021 ◽  
Vol 9 (1) ◽  
pp. 29-40
Author(s):  
Sharon Chan Suet Yan ◽  
Alice Tang Su Wei ◽  
Jie Hui Bong ◽  
Quor Ling Teh ◽  
Shanmugapiriya Sivalingam ◽  
...  

The Robust and Energy Efficient Authentication Protocol works for Industrial Internet of Things. The Internet of Things (IoT) is an arising innovation and expected to give answers for different modern fields. The IoT enable connection of physical devices all around the world to the internet by collecting and sharing critical and real-time data among each other. The increment of devices increases the computational cost during data transmission between devices and towards the internet. In this paper we proposed a solution that is a multi-factor authentication protocol to enhance the protocol proposed by Li et al. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome by Li et al. scheme. Our contribution for this project is, we proposed the solution that a multi-factor authentication protocol to enhance the protocol proposed. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome. The idea of adding OTP is inspired by where they scheme correlates to biometric of user as well. Our proposal is lower cost than the three protocols regarding authentication overhead and computational cost perspectives. Challenges and future directions of this paper examined the security shortcomings of a client confirmation convention for WSN, which is as proposed by Chang and Le. To address the normal security shortcomings of past protocols, we proposed a strong and energy effective three-factor authentication protocol for WSN.


Smart Cities ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 253-270
Author(s):  
Mohammed Bin Hariz ◽  
Dhaou Said ◽  
Hussein T. Mouftah

This paper focuses on transportation models in smart cities. We propose a new dynamic mobility traffic (DMT) scheme which combines public buses and car ride-sharing. The main objective is to improve transportation by maximizing the riders’ satisfaction based on real-time data exchange between the regional manager, the public buses, the car ride-sharing and the riders. OpenStreetMap and OMNET++ were used to implement a realistic scenario for the proposed model in a city like Ottawa. The DMT scheme was compared to a multi-loading system used for a school bus. Simulations showed that rider satisfaction was enhanced when a suitable combination of transportation modes was used. Additionally, compared to the other scheme, this DMT scheme can reduce the stress level of car ride-sharing and public buses during the day to the minimal level.


Telecom ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 108-140
Author(s):  
Paulo Álvares ◽  
Lion Silva ◽  
Naercio Magaia

It had been predicted that by 2020, nearly 26 billion devices would be connected to the Internet, with a big percentage being vehicles. The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims at improving traffic congestion, travel time, and comfort, all the while reducing pollution and accidents. However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. Blockchain is a fairly recent technology that guarantees trust between nodes through cryptography mechanisms and consensus protocols in distributed, untrustful environments, like IoV networks. Much research has been done in implementing the former in the latter to impressive results, as Blockchain can cover and offer solutions to many IoV problems. However, these implementations have to deal with the challenge of IoV node’s resource constraints since they do not suffice for the computational and energy requirements of traditional Blockchain systems, which is one of the biggest limitations of Blockchain implementations in IoV. Finally, these two technologies can be used to build the foundations for smart cities, enabling new application models and better results for end-users.


Sign in / Sign up

Export Citation Format

Share Document