Advertisement

Secure Communication in UAV Assisted HetNets: A Proposed Model

  • Aabid Rashid
  • Diwankshi Sharma
  • Tufail A. Lone
  • Sumeet Gupta
  • Sachin Kumar GuptaEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)

Abstract

In the current scientific and technological world, every emerging/advanced country employs Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its civilian, military and natural catastrophes, etc. The area of focusing in this work will be military zones for getting securely the reconnaissance information from enemy/hostile areas in their battlefields and nuclear war conditions. Though, once the network is created for such scenarios, the untypical nature of UAV assisted network demands protection evaluation. The UAV facilitated HetNets, therefore, demands trust worthy and secure communication among military users using the network. Authentication is one characteristic which enables to mitigate security issues. The prevalent identity and authentication scheme is thus intended to tackle the security threats in HetNets assisted by UAV. In this paper, a security model is proposed based on Identity Based (IB) authentication scheme for UAV-integrated HetNets. The absolutism of such a suggested scheme is screened using the AVISPA tool and some of its outcomes has shown that our scheme is resistant to the vulnerabilities of intruders like replay, impersonation etc.

Keywords

UAV HetNet IBE Secure communication Network performance 

References

  1. 1.
    Tuna, G., Nefzi, B., Conte, G.: Unmanned aerial vehicles-aided communication system for disaster recovery. J. Netw. Comput. Appl. 41, 27–36 (2014).  https://doi.org/10.1016/j.jnca.2013.10.002CrossRefGoogle Scholar
  2. 2.
    Yang, G., Xiao, M., Alam, M., Huang, Y.: Low-latency heterogeneous networks millimeter-wave communications. IEEE Commun. Mag. 56, 124–129 (2018).  https://doi.org/10.1109/MCOM.2018.1700874CrossRefGoogle Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002. ACM, October 2002.  https://doi.org/10.1145/586110.586117
  4. 4.
    Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: Ist ACM Workshop on Security of Ad-Hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, pp. 62–71, January 2003.  https://doi.org/10.1145/986858.986868
  5. 5.
    Du, X., Xiao, Y., Chen, H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5, 24–34 (2007).  https://doi.org/10.1016/j.adhoc.2006.05.012CrossRefGoogle Scholar
  6. 6.
    Pietrowicz, S., Shim, H., Di Crescenzo, G., Zhang, T.: VDTLS - Providing secure communications in vehicle networks. In: INFOCOM Workshops 2008, Phoenix, AZ, USA. IEEE (2008).  https://doi.org/10.1109/infocom.2008.4544651
  7. 7.
    Stading, T.: Secure Communication in a Distributed System Using Identity Based Encryption. In: CCGRID Third IEEE/ACM International Symposium on Cluster Computing and the Grid, Tokyo, Japan. IEEE (2003).  https://doi.org/10.1109/ccgrid.2003.1199395
  8. 8.
    Li, L., et al.: A networking identity authentication scheme combining fingerprint coding and identity based encryption. In: Intelligence and Security Informatics, New Brunswick, USA, pp. 129–132. IEEE (2007).  https://doi.org/10.1109/isi.2007.379545
  9. 9.
    Jia, C., Liao, Y., Chen, K.: Secure encryption in wireless sensor network. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, China, pp. 1–4. IEEE, October 2008.  https://doi.org/10.1109/wicom.2008.870
  10. 10.
    Yang, G., Rong, C., Veigner, C., Wang, J., Cheng, H.: Identity-based key agreement and encryption for wireless sensor network. IJCSNS Int. J. Comput. Sci. Netw. Secur. 13, 54–60 (2006).  https://doi.org/10.1016/s1005-8885(07)60034-xCrossRefGoogle Scholar
  11. 11.
    Khan, M., Niemi, V.: Privacy enhanced fast mutual authentication in 5G network using identity based encryption. J. ICT 5, 69–90 (2017).  https://doi.org/10.13052/jicts2245-800x.514CrossRefGoogle Scholar
  12. 12.
    Haque, M.S., Chowdhury, M.U.: A new cyber security framework towards secure data communication for Unmanned Aerial Vehicle (UAV). In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 239, pp. 113–122. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-78816-6_9CrossRefGoogle Scholar
  13. 13.
    Szczechowiak, P., Collier, M.: Tiny IBE: identity-based encryption for heterogeneous sensor networks. In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, VIC, Australia, pp. 349–354, 7–10 December 2009.  https://doi.org/10.1109/issnip.2009.5416743
  14. 14.
    Adiga, B.S., Balamuralidhar, P., Rajan, M.A., Shastry, R., Shivraj, V.L.: An identity based encryption using elliptic curve cryptography for secure M2M communication. In: SecurIT 12 Proceedings of the First International Conference on Security of Internet of Things, Kollam, India, pp. 68–74, August 2012.  https://doi.org/10.1145/2490428.2490438
  15. 15.
    Anggorojati, B., Prasad, R.: Securing communication in inter domains Internet of Things using identity-based cryptography. In: 2017 International Workshop on Big Data and Information Security (IWBIS), Jakarta, Indonesia, pp. 137–142. IEEE, September 2017.  https://doi.org/10.1109/iwbis.2017.8275115
  16. 16.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-44647-8_13CrossRefGoogle Scholar
  17. 17.
    Martin, L., Appenzeller, G., Schertler, M.: RFC5408 - Identity-Based Encryption Architecture and Supporting, Network Working Group (2009)Google Scholar
  18. 18.
    Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45455-1_26CrossRefGoogle Scholar
  19. 19.
    Challener, D., Yoder, K., Catherman, R., et al.: A practical Guide to Trusted Computing. IBM Press (2008)Google Scholar
  20. 20.
    AVISPA. Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed Nov 2015

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Aabid Rashid
    • 1
  • Diwankshi Sharma
    • 1
  • Tufail A. Lone
    • 1
  • Sumeet Gupta
    • 1
  • Sachin Kumar Gupta
    • 1
    Email author
  1. 1.School of Electronics and Communication EngineeringShri Mata Vaishno Devi UniversityKatraIndia

Personalised recommendations