Secure Communication in UAV Assisted HetNets: A Proposed Model

  • Aabid Rashid
  • Diwankshi Sharma
  • Tufail A. Lone
  • Sumeet Gupta
  • Sachin Kumar GuptaEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)


In the current scientific and technological world, every emerging/advanced country employs Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its civilian, military and natural catastrophes, etc. The area of focusing in this work will be military zones for getting securely the reconnaissance information from enemy/hostile areas in their battlefields and nuclear war conditions. Though, once the network is created for such scenarios, the untypical nature of UAV assisted network demands protection evaluation. The UAV facilitated HetNets, therefore, demands trust worthy and secure communication among military users using the network. Authentication is one characteristic which enables to mitigate security issues. The prevalent identity and authentication scheme is thus intended to tackle the security threats in HetNets assisted by UAV. In this paper, a security model is proposed based on Identity Based (IB) authentication scheme for UAV-integrated HetNets. The absolutism of such a suggested scheme is screened using the AVISPA tool and some of its outcomes has shown that our scheme is resistant to the vulnerabilities of intruders like replay, impersonation etc.


UAV HetNet IBE Secure communication Network performance 


  1. 1.
    Tuna, G., Nefzi, B., Conte, G.: Unmanned aerial vehicles-aided communication system for disaster recovery. J. Netw. Comput. Appl. 41, 27–36 (2014). Scholar
  2. 2.
    Yang, G., Xiao, M., Alam, M., Huang, Y.: Low-latency heterogeneous networks millimeter-wave communications. IEEE Commun. Mag. 56, 124–129 (2018). Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002. ACM, October 2002.
  4. 4.
    Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: Ist ACM Workshop on Security of Ad-Hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, pp. 62–71, January 2003.
  5. 5.
    Du, X., Xiao, Y., Chen, H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5, 24–34 (2007). Scholar
  6. 6.
    Pietrowicz, S., Shim, H., Di Crescenzo, G., Zhang, T.: VDTLS - Providing secure communications in vehicle networks. In: INFOCOM Workshops 2008, Phoenix, AZ, USA. IEEE (2008).
  7. 7.
    Stading, T.: Secure Communication in a Distributed System Using Identity Based Encryption. In: CCGRID Third IEEE/ACM International Symposium on Cluster Computing and the Grid, Tokyo, Japan. IEEE (2003).
  8. 8.
    Li, L., et al.: A networking identity authentication scheme combining fingerprint coding and identity based encryption. In: Intelligence and Security Informatics, New Brunswick, USA, pp. 129–132. IEEE (2007).
  9. 9.
    Jia, C., Liao, Y., Chen, K.: Secure encryption in wireless sensor network. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, China, pp. 1–4. IEEE, October 2008.
  10. 10.
    Yang, G., Rong, C., Veigner, C., Wang, J., Cheng, H.: Identity-based key agreement and encryption for wireless sensor network. IJCSNS Int. J. Comput. Sci. Netw. Secur. 13, 54–60 (2006). Scholar
  11. 11.
    Khan, M., Niemi, V.: Privacy enhanced fast mutual authentication in 5G network using identity based encryption. J. ICT 5, 69–90 (2017). Scholar
  12. 12.
    Haque, M.S., Chowdhury, M.U.: A new cyber security framework towards secure data communication for Unmanned Aerial Vehicle (UAV). In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 239, pp. 113–122. Springer, Cham (2018). Scholar
  13. 13.
    Szczechowiak, P., Collier, M.: Tiny IBE: identity-based encryption for heterogeneous sensor networks. In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, VIC, Australia, pp. 349–354, 7–10 December 2009.
  14. 14.
    Adiga, B.S., Balamuralidhar, P., Rajan, M.A., Shastry, R., Shivraj, V.L.: An identity based encryption using elliptic curve cryptography for secure M2M communication. In: SecurIT 12 Proceedings of the First International Conference on Security of Internet of Things, Kollam, India, pp. 68–74, August 2012.
  15. 15.
    Anggorojati, B., Prasad, R.: Securing communication in inter domains Internet of Things using identity-based cryptography. In: 2017 International Workshop on Big Data and Information Security (IWBIS), Jakarta, Indonesia, pp. 137–142. IEEE, September 2017.
  16. 16.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). Scholar
  17. 17.
    Martin, L., Appenzeller, G., Schertler, M.: RFC5408 - Identity-Based Encryption Architecture and Supporting, Network Working Group (2009)Google Scholar
  18. 18.
    Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002). Scholar
  19. 19.
    Challener, D., Yoder, K., Catherman, R., et al.: A practical Guide to Trusted Computing. IBM Press (2008)Google Scholar
  20. 20.
    AVISPA. Automated validation of internet security protocols and applications. Accessed Nov 2015

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Aabid Rashid
    • 1
  • Diwankshi Sharma
    • 1
  • Tufail A. Lone
    • 1
  • Sumeet Gupta
    • 1
  • Sachin Kumar Gupta
    • 1
    Email author
  1. 1.School of Electronics and Communication EngineeringShri Mata Vaishno Devi UniversityKatraIndia

Personalised recommendations