scholarly journals Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET

Drones ◽  
2022 ◽  
Vol 6 (1) ◽  
pp. 14
Author(s):  
Arun Sekar Rajasekaran ◽  
Azees Maria ◽  
Fadi Al-Turjman ◽  
Chadi Altrjman ◽  
Leonardo Mostarda

As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a result, new technologies between user/control station and UAVs have been developed. FANET (Flying Ad-Hoc Network) is a subset of the MANET (Mobile Ad-Hoc Network) that includes UAVs. UAVs, simply called drones, are used for collecting sensitive data in real time. The security and privacy of these data are of priority importance. Therefore, to overcome the privacy and security threats problem and to make communication between the UAV and the user effective, a competent anonymous mutual authentication scheme is proposed in this work. There are several methodologies addressed in this work such as anonymous batch authentication in FANET which helps to authenticate a large group of drones at the same time, thus reducing the computational overhead. In addition, the integrity preservation technique helps to avoid message alteration during transmission. Moreover, the security investigation section discusses the resistance of the proposed work against different types of possible attacks. Finally, the proposed work is related to the prevailing schemes in terms of communication and computational cost and proves to be more efficient.

Vehicular Ad-hoc network a subclass of Mobile Ad-hoc network with various features providing Vehicle-to-Vehicle communication, Vehicle-to-RSU communication, Vehicle-to-Trusted Authority Communication. VANET is gaining higher attention now days both in industry and academic area and has become a trending research topic for research but still a lot of improvements is required in this area. Security of data is one of the major challenge in VANET. Encryption of data with the help of various encryption algorithms came up as solution for securing communication in VANET. But existing encryption algorithms used to secure VANET’s are complex due to which data are not delivered on time and face a lot of problems like privacy of data ,non-repudiation and cost (i.e. communication cost, computational cost).In our proposed scheme we use a hybrid approach, which contain ECC algorithm( asymmetric algorithm).ECC algorithm is used for encryption of personal details (i.e. Speed, location, device address) and AES algorithm (symmetric algorithm ) is used for encryption for safety messages along with output of ECC algorithm. The objective of this hybrid approach is to perform double encryption on personal details for more privacy of personal data (using ECC and AES algorithm) and single encryption on safety messages (using AES algorithm) so safety messages are delivered on time and without any delay.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 217
Author(s):  
Dr S.SivaNageswara Rao ◽  
Orchu Aruna ◽  
Dr K.Lakshminadh

Now a day, every one using mobile devices for communicating with others. The development of new technologies, like Internet of Things (IoT) needs coverage, connectivity, scalability and QoS. In ubiquity networks, the major issues are coverage, connectivity, scalability and QoS. To solve these limitations, integrating wireless networks with ad hoc networks. This paper provides detail survey on how ad hoc networks are integrated with Cellular Network, Wireless Mesh Networks and Wireless Sensor Networks. This integration may resolve the problems of coverage, connectivity, scalability and QoS.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1302
Author(s):  
Mishri Saleh Al-Marshoud ◽  
Ali H. Al-Bayatti ◽  
Mehmet Sabir Kiraz

Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system’s infrastructure introduce the potential for attacks that lessen safety and weaken passengers’ privacy. The purpose of short-lived anonymous identities, called “pseudo-identities”, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined area, called a cryptographic mix-zone (CMIX) to ensure enhanced protection. According to ETSI ITS technical report recommendations, the researchers must consider the low-density scenarios to achieve unlinkability in CMIX. Recently, Christian et al. proposed a Chaff-based CMIX scheme that sends fake messages under the consideration of low-density conditions to enhance vehicles’ privacy and confuse attackers. To accomplish full unlinkability, in this paper, we first show the following security and privacy vulnerabilities in the Christian et al. scheme: Linkability attacks outside the CMIX may occur due to deterministic data sharing during the authentication phase (e.g., duplicate certificates for each communication). Adversaries may inject fake certificates, which breaks Cuckoo Filters’ (CFs) updates authenticity, and the injection may be deniable. CMIX symmetric key leakage outside the coverage may occur. We propose a VPKI-based protocol to mitigate these issues. First, we use a modified version of Wang et al.’s scheme to provide mutual authentication without revealing the real identity. To this end, the messages of a vehicle are signed with a different pseudo-identity “certificate”. Furthermore, the density is increased via the sending of fake messages in low traffic periods to provide unlinkability outside the mix-zone. Second, unlike Christian et al.’s scheme, we use the Adaptive Cuckoo Filter (ACF) instead of CF to overcome the false positives’ effect on the whole filter. Moreover, to prevent any alteration of the ACFs, only RUSs distribute the updates, and they sign the new fingerprints. Third, the mutual authentication prevents any leakage from the mix zones’ symmetric keys by generating a fresh one for each communication through a Diffie–Hellman key exchange.


2018 ◽  
Vol 8 (10) ◽  
pp. 1964 ◽  
Author(s):  
Qazi Ali ◽  
Naveed Ahmad ◽  
Abdul Malik ◽  
Gauhar Ali ◽  
Waheed Rehman

Intelligent transport system (ITS), owing to their potential to enhance road safety and improve traffic management, have attracted attention from automotive industries and academia in recent years. The underlying technology—i.e., vehicular ad-hoc networks (VANETs)—provide a means for vehicles to intelligently exchange messages regarding road and traffic conditions to enhance safety. The open nature of ITS as wireless communication technology leads to many security and privacy challenges. These challenges pertain to confidentiality, authentication, integrity, non-repudiation, location privacy, identity privacy, anonymity, certificate revocation, and certificate resolution. This article aims to propose a novel taxonomy of security and privacy issues and solutions in ITS. Furthermore, categorization of security and privacy schemes in ITS and their limitations are discussed with various parameters—scalability, privacy, computational cost, communication overhead, latency—and various types of security attacks has been analyzed. This article leverages new researchers for challenges and opportunities related to security and privacy in ITS.


Author(s):  
Kijpokin Kasemsap

This chapter explains the components of Radio Frequency Identification (RFID); the aspects of RFID; the barriers to RFID utilization; the privacy and security issues of RFID; the RFID applications in supply chain management; the RFID applications in the health care industry; the RFID applications in modern business; the Near Field Communication (NFC) in mobile devices; the overview of Mobile Ad-Hoc Network (MANET); the security concern of MANET; and the advanced issues of MANET in the digital age. RFID and MANET become the growing components of Information and Communication Technology (ICT) applications and can be effectively utilized in global operations. The chapter argues that RFID and MANET have the potential to increase the efficiency of operations in various industries, improve asset visibility and traceability, decrease reliance on manual processes, reduce operation costs, and provide useful data for business analytics.


Electronics ◽  
2019 ◽  
Vol 8 (10) ◽  
pp. 1172 ◽  
Author(s):  
Ariel Stulman ◽  
Alan Stulman

vanets, iot, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an underlying communication model, the (mobile) ad hoc network (manet) paradigm is used, which implements a peer-to-peer communication model rather than the more traditional infrastructure model. Of course, privacy, confidentiality, integrity, and security related issues are of utter importance in such contexts as well. In this paper, we wish to present a key exchange technique, which builds upon the inherent characteristic of manets: their fluctuating topology. By splitting key exchange information into multiple parts and spraying them over space or time, the ever-changing topology of the network almost completely removes an active attacker’s success ratio. Algorithms are then simulated, and the results presented and discussed. We further point to future directions and uses for this research.


Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 482 ◽  
Author(s):  
Lianhai Liu ◽  
Yujue Wang ◽  
Jingwei Zhang ◽  
Qing Yang

A vehicular ad hoc network (VANET) is a special mobile ad hoc network that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake). In VANET, there are many vehicle platoon driving scenes, where vehicles with identical attributes (location, organization, etc.) are organized as a group. However, this organization causes the issue of security threats (message confidentiality, identity privacy, etc.) because of an unsafe wireless communication channel. To protect the security and privacy of group communication, it is necessary to design an effective group key agreement scheme. By negotiating a dynamic session secret key using a fixed roadside unit (RSU), which has stronger computational ability than the on-board unit (OBU) equipped on the vehicle, the designed scheme can help to provide more stable communication performance and speed up the encryption and decryption processes. To effectively implement the anonymous authentication mechanism and authentication efficiency, we use a batch authentication scheme and a shared secret key mechanism among the vehicles, RSUs and trusted authority (TA). We design an efficient group secret key agreement scheme, which satisfies the above communication and security requirements, protects the privacy of vehicles, and traces the real identity of the vehicle at a time when it is necessary. Computational analysis shows that the proposed scheme is secure and more efficient than existing schemes.


2020 ◽  
Vol 10 (5) ◽  
pp. 40-45
Author(s):  
Israa M. Al-dulaimi ◽  
Ayman Khalil

Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. The present paper is a provide a thorough background on VANETs and their entities; different security attacks; and all requirements of the privacy and security for VANETs. This paper may serve as a guide and reference for VANETs in the design and implementation of any new techniques for protection and privacy.


Sign in / Sign up

Export Citation Format

Share Document