R3ACWU : A Lightweight, Trustworthy Authentication Scheme for UAV-Assisted IoT Applications

Department

Program

Citation of Original Publication

Adil, Muhammad, Hussein Abulkasim, Ahmed Farouk, and Houbing Song. “R3ACWU : A Lightweight, Trustworthy Authentication Scheme for UAV-Assisted IoT Applications.” IEEE Transactions on Intelligent Transportation Systems, 2024, 1–12. https://doi.org/10.1109/TITS.2023.3342831.

Rights

© 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Subjects

Abstract

The technology of Unmanned Aerial Vehicles (UAVs) has sparked a revolution in numerous Internet of Things (IoT) applications, such as flood monitoring, wildfire monitoring, coastal area surveillance, intelligent transportation, and classified military operations, etc. This technology offers several advantages when used as a flying base station to enhance the communication metrics of an employed IoT appplication. However, as an integrated technology (UAV-assisted IoT applications), it suffers from many challenges, and security is one of the foremost concerns. Considering that, in this paper, we proposed a hybrid lightweight key exchange authentication model for UAV-assisted IoT applications to resolve the device-to-device (D2D) authentication and data privacy issues in these networks. The proposed model employs five different security parameters named registration, authentication, authorization, accounting, and cache wash and update (R3ACWU) in coordination with a hash function. The network architecture consists of UAVs, IoT devices, and micro base stations, followed by base stations, authentication servers, and service providers (SP). In this framework, we introduce a concept known as ‘dead time’, a specific time period after which each device’s cache memory is cleared and updated. This practice not only enhances the security of the devices in use but also reduces computational and memory overhead by eliminating the records of devices that haven’t participated in the communication process within the specified time frame. Results statistics of our lightweight R3ACWU authentication scheme exhibit notable improvement corresponded to the present authentication schemes in terms of comparative parameters.