Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.6.1247

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting  

Oh, Sang Yun (Korea University)
Jeong, Jae Yeol (Korea University)
Jeong, Ik Rae (Korea University)
Byun, Jin Wook (Pyeongtaek University)
Abstract
For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.
Keywords
Wireless sensor network; Moblie sink; Node management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Gharibi, R. Boutaba, and S. L. Waslander. "Internet of drones," IEEE Access, vol. 4, pp. 1148-1162, Mar. 2016.   DOI
2 I. Chlamtac, M. Conti, and J. J-N. Liu, "Mobile ad hoc networking: imperatives and challenges," Ad hoc networks, vol. 1, no. 1, pp. 13-64, Jul. 2003.   DOI
3 W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," Proceedings of the 33rd annual Hawaii international conference on system sciences. IEEE, Jan. 2000.
4 R. I. da Silva, and M. A. Nascimento, "On best drone tour plans for data collection in wireless sensor network," Proceedings of the 31st annual ACM symposium on applied computing, Apr. 2016.
5 R. Amin, and G. P. Biswas, "A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks," Ad Hoc Networks, vol. 36, pp. 58-80, Jan. 2016.   DOI
6 J. Srinivas, S. Mukhopadhyay, and D. Mishra, "Secure and efficient user authentication scheme for multi-gateway wireless sensor networks," Ad Hoc Networks, vol. 54, pp. 147-169, Jan. 2017.   DOI
7 M. Wazid, A. K. Das, N. Kumar, A. V. Vasilakos, and J. J. Rodrigues, "Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of drones deployment," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3572-3584, Dec. 2018.   DOI
8 Y. Yao, and J. Gehrke. "The cougar approach to in-network query processing in sensor networks," ACM Sigmod record, vol. 31, no. 3, pp 9-18, Sep. 2002.   DOI
9 D. B. David, "Secure and efficient mutual adaptive user authentication scheme for heterogeneous wireless sensor networks using multimedia client-server systems," Wireless Personal Communications, vol. 87, no. 3, pp. 1013-1035, May. 2016.   DOI
10 L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, no. 15, pp. 2787-2805, May. 2010.   DOI
11 N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," International workshop on cryptographic hardware and embedded systems. Springer, pp. 11-132, 2004.
12 J. Tang, H. Huang, S. Guo, and Y. Yang, "Dellat: Delivery latency minimization in wireless sensor networks with mobile sink," Journal of Parallel and Distributed Computing, vol. 83, pp. 133-142, Sep. 2015.   DOI
13 F. Al-Turjman, Y. K. Ever, E. Ever, and H. X. Nguyen, "Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks," IEEE Access, vol. 5, pp. 24617-24631, Oct. 2017.   DOI
14 Y. K. Ever, "A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications," Computer Communications, vol. 155, pp.143-149, Apr. 2020.   DOI
15 W. Jongho, S. Seung-Hyun, and E. Bertino, "Certificateless cryptographic protocols for efficient drone-based smart city applications," IEEE Access, vol. 5, pp. 3721-3749, Mar. 2017.   DOI
16 B. D. Deebak, and F. Al-Turjman, "A smart lightweight privacy preservation scheme for IoT-based UAV communication systems," Computer Communications, vol. 162, pp. 102-117, Oct. 2020.   DOI
17 T. Alladi, V. Chamola, and N. Kumar, "PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks," Computer Communications, vol. 160, pp. 81-90, Jul. 2020.   DOI