4.7 Article

A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance

Journal

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
Volume 23, Issue 10, Pages 19634-19643

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2021.3129913

Keywords

Protocols; Security; Drones; Cryptography; Authentication; Vehicular ad hoc networks; Privacy; Authentication protocol; Internet of Drones; VANET; intelligent transportation systems; mutual authentication; information security

Funding

  1. King Saud University, Riyadh, Saudi Arabia [RSP-2021/395]
  2. Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah, Saudi Arabia [FP-88-43]

Ask authors/readers for more resources

The advancement of ICT and the Internet has facilitated the use of Unmanned Aerial Vehicles (UAVs) in assisting Vehicular Ad-hoc Networks (VANETs), providing real-time data access and monitoring capabilities in smart cities. However, security, privacy, and routing concerns remain significant challenges for UAV-assisted VANETs, where Deep Learning Algorithms (DLAs) can play a vital role.
The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay node's role among the disconnected segments in the road. In this scenario, the communication is done between Vehicles to UAVs (V2U), subsequently transforming into a UAV-assisted VANET. UAV-assisted VANET allows users to access real-time data, especially the monitoring data in smart cities using current mobile networks. Nevertheless, due to the open nature of communication infrastructure, the high mobility of vehicles along with the security and privacy constraints are the significant concerns of UAV-assisted VANET. In these scenarios, Deep Learning Algorithms (DLA) could play an effective role in the security, privacy, and routing issues of UAV-assisted VANET. Keeping this in mind, we have devised a DLA-based key-exchange protocol for UAV-assisted VANET. The proposed protocol extends the scalability and uses secure bitwise XOR operations, one-way hash functions, including user's biometric verification when users and drones are mutually authenticated. The proposed protocol can resist many well-known security attacks and provides formal and informal security under the Random Oracle Model (ROM). The security comparison shows that the proposed protocol outperforms the security performance in terms of running time cost and communication cost and has effective security features compared to other related protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available