Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/174189
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWang, Dien_US
dc.contributor.authorCao, Yueen_US
dc.contributor.authorLam, Kwok-Yanen_US
dc.contributor.authorHu, Yulinen_US
dc.contributor.authorKaiwartya Omprakashen_US
dc.date.accessioned2024-03-20T01:33:15Z-
dc.date.available2024-03-20T01:33:15Z-
dc.date.issued2024-
dc.identifier.citationWang, D., Cao, Y., Lam, K., Hu, Y. & Kaiwartya Omprakash (2024). Authentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communication. IEEE Internet of Things Journal. https://dx.doi.org/10.1109/JIOT.2024.3371101en_US
dc.identifier.issn2327-4662en_US
dc.identifier.urihttps://hdl.handle.net/10356/174189-
dc.description.abstractFor unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serve as relay nodes of air-based backup network to support transmission of rescue messages to emergency communication vehicles (ECVs), while ECVs provide on-site ground communication and connectivity to the command center (CC) of the rescue operation. Existing works seldom emphasize communication security such as authenticity of communicating parties and integrity of message content. In this connection, authentication and key agreement (AKA) protocols are promising solutions for achieving communication security. However, the traditional approaches to endpoint security and entity authentication of principals may not be practical in emergency situations, in which network equipment and security modules are exposed to an open and untrusted physical environment. Besides, there is a lack of attention to the study of privacy impacts resulted from the physical loss of UAVs. More importantly, cyber attacks and excessive overhead may deteriorate AKA availability. Motivated by above challenges, we propose an AKA protocol, namely AKAEC, which is based on three-factor (i.e. smart card, biometrics, and password) and physically unclonable function (PUF) for protecting UAVs-assisted emergency communication. Specifically, AKAEC includes ECV-to-UAV (E2U) and UAV-to-UAV (U2U), where the former achieves secure emergency communication between ECV and UAV, while the latter realizes secure emergency communication between UAV and UAV. We then provide a formal security proof under the Real-Or-Random (ROR) model and formal security verification by AVISPA. This is followed by a security analysis to show that AKAEC meets the security goals defined for emergency situations. Finally, the performance of AKAEC is evaluated from communication overhead and computational overhead.en_US
dc.language.isoenen_US
dc.relation.ispartofIEEE Internet of Things Journalen_US
dc.rights© 2024 IEEE. All rights reserved.en_US
dc.subjectComputer and Information Scienceen_US
dc.titleAuthentication and key agreement based on three factors and PUF for UAVs-assisted post-disaster emergency communicationen_US
dc.typeJournal Articleen
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.identifier.doi10.1109/JIOT.2024.3371101-
dc.description.versionSubmitted/Accepted versionen_US
dc.subject.keywordsUnmanned aerial vehiclesen_US
dc.subject.keywordsAuthenticationen_US
item.grantfulltextnone-
item.fulltextNo Fulltext-
Appears in Collections:SCSE Journal Articles

SCOPUSTM   
Citations

4
Updated on Oct 7, 2024

Page view(s)

63
Updated on Oct 7, 2024

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.