一种支持6G的智能无人机网络隐私保护访问控制协议

IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS
Khalid Mahmood , Salman Shamshad , Mohammad Hossein Anisi , Alessandro Brighente , Muhammad Asad Saleem , Ashok Kumar Das
{"title":"一种支持6G的智能无人机网络隐私保护访问控制协议","authors":"Khalid Mahmood ,&nbsp;Salman Shamshad ,&nbsp;Mohammad Hossein Anisi ,&nbsp;Alessandro Brighente ,&nbsp;Muhammad Asad Saleem ,&nbsp;Ashok Kumar Das","doi":"10.1016/j.vehcom.2025.100937","DOIUrl":null,"url":null,"abstract":"<div><div>Due to their autonomous operation, high mobility, and real-time communication capabilities, 6G-supported Unmanned Aerial Vehicles (6G-UAVs) (i.e., drones) are increasingly being utilized to enhance data collection and management in Intelligent Transportation Systems (ITSs). Despite their manifold benefits, 6G-supported UAV-based ITS (6G-U-ITS) faces unique security challenges beyond conventional cyber and physical threats. These include real-time authentication, impersonation attacks, physical tampering or cloning and protection against identity spoofing in highly dynamic environments. For instance, an attacker may steal a drone and use its identity to send authenticated malicious messages to the ITS, causing road accidents. Therefore, a secure authentication scheme must ensure resilience against UAV identity theft and unauthorized access while maintaining low-latency and computational efficiency to support the stringent real-time security requirements of 6G-U-ITS. Existing authentication schemes are not specifically designed to address these challenges, making it imperative to develop a lightweight and robust authentication mechanism tailored for 6G-U-ITS. Moreover, most of the existing protocols are vulnerable to physical tampering and impersonation attacks and also require high computation overhead. In this paper, to mitigate these limitations and satisfy the aforementioned requirements, we propose a secure access control protocol for 6G-U-ITS. To the best of our knowledge, this is the first security solution in the literature that can achieve security against UAVs physical attacks. Furthermore, we justify the robustness of the designed protocol against potential attacks through detailed formal and informal security assessment. Via testbed experiments, we show that our protocol achieves 20.66% and 22.82% higher efficiency on communication and computation overhead, respectively, compared to other contemporary competing protocols.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100937"},"PeriodicalIF":5.8000,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A privacy-preserving access control protocol for 6G supported intelligent UAV networks\",\"authors\":\"Khalid Mahmood ,&nbsp;Salman Shamshad ,&nbsp;Mohammad Hossein Anisi ,&nbsp;Alessandro Brighente ,&nbsp;Muhammad Asad Saleem ,&nbsp;Ashok Kumar Das\",\"doi\":\"10.1016/j.vehcom.2025.100937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Due to their autonomous operation, high mobility, and real-time communication capabilities, 6G-supported Unmanned Aerial Vehicles (6G-UAVs) (i.e., drones) are increasingly being utilized to enhance data collection and management in Intelligent Transportation Systems (ITSs). Despite their manifold benefits, 6G-supported UAV-based ITS (6G-U-ITS) faces unique security challenges beyond conventional cyber and physical threats. These include real-time authentication, impersonation attacks, physical tampering or cloning and protection against identity spoofing in highly dynamic environments. For instance, an attacker may steal a drone and use its identity to send authenticated malicious messages to the ITS, causing road accidents. Therefore, a secure authentication scheme must ensure resilience against UAV identity theft and unauthorized access while maintaining low-latency and computational efficiency to support the stringent real-time security requirements of 6G-U-ITS. Existing authentication schemes are not specifically designed to address these challenges, making it imperative to develop a lightweight and robust authentication mechanism tailored for 6G-U-ITS. Moreover, most of the existing protocols are vulnerable to physical tampering and impersonation attacks and also require high computation overhead. In this paper, to mitigate these limitations and satisfy the aforementioned requirements, we propose a secure access control protocol for 6G-U-ITS. To the best of our knowledge, this is the first security solution in the literature that can achieve security against UAVs physical attacks. Furthermore, we justify the robustness of the designed protocol against potential attacks through detailed formal and informal security assessment. Via testbed experiments, we show that our protocol achieves 20.66% and 22.82% higher efficiency on communication and computation overhead, respectively, compared to other contemporary competing protocols.</div></div>\",\"PeriodicalId\":54346,\"journal\":{\"name\":\"Vehicular Communications\",\"volume\":\"54 \",\"pages\":\"Article 100937\"},\"PeriodicalIF\":5.8000,\"publicationDate\":\"2025-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Vehicular Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214209625000646\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vehicular Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214209625000646","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

由于其自主操作、高机动性和实时通信能力,6g支持的无人机(即无人机)越来越多地用于增强智能交通系统(ITSs)的数据收集和管理。尽管具有多方面的优势,但6g支持的基于无人机的ITS (6G-U-ITS)面临着传统网络和物理威胁之外的独特安全挑战。这包括实时身份验证、模拟攻击、物理篡改或克隆,以及在高度动态环境中防止身份欺骗。例如,攻击者可能会窃取无人机,并使用其身份向its发送经过身份验证的恶意信息,从而导致交通事故。因此,一个安全的认证方案必须确保对无人机身份盗窃和未经授权访问的弹性,同时保持低延迟和计算效率,以支持6G-U-ITS严格的实时安全要求。现有的身份验证方案并不是专门为解决这些挑战而设计的,因此必须为6G-U-ITS开发一种轻量级且健壮的身份验证机制。此外,大多数现有协议容易受到物理篡改和模拟攻击,并且需要很高的计算开销。在本文中,为了减轻这些限制并满足上述要求,我们提出了一种6G-U-ITS的安全访问控制协议。据我们所知,这是文献中第一个可以实现针对无人机物理攻击的安全解决方案。此外,我们通过详细的正式和非正式的安全评估来证明所设计的协议对潜在攻击的鲁棒性。通过测试实验,我们的协议在通信和计算开销方面分别比其他当代竞争协议提高了20.66%和22.82%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A privacy-preserving access control protocol for 6G supported intelligent UAV networks
Due to their autonomous operation, high mobility, and real-time communication capabilities, 6G-supported Unmanned Aerial Vehicles (6G-UAVs) (i.e., drones) are increasingly being utilized to enhance data collection and management in Intelligent Transportation Systems (ITSs). Despite their manifold benefits, 6G-supported UAV-based ITS (6G-U-ITS) faces unique security challenges beyond conventional cyber and physical threats. These include real-time authentication, impersonation attacks, physical tampering or cloning and protection against identity spoofing in highly dynamic environments. For instance, an attacker may steal a drone and use its identity to send authenticated malicious messages to the ITS, causing road accidents. Therefore, a secure authentication scheme must ensure resilience against UAV identity theft and unauthorized access while maintaining low-latency and computational efficiency to support the stringent real-time security requirements of 6G-U-ITS. Existing authentication schemes are not specifically designed to address these challenges, making it imperative to develop a lightweight and robust authentication mechanism tailored for 6G-U-ITS. Moreover, most of the existing protocols are vulnerable to physical tampering and impersonation attacks and also require high computation overhead. In this paper, to mitigate these limitations and satisfy the aforementioned requirements, we propose a secure access control protocol for 6G-U-ITS. To the best of our knowledge, this is the first security solution in the literature that can achieve security against UAVs physical attacks. Furthermore, we justify the robustness of the designed protocol against potential attacks through detailed formal and informal security assessment. Via testbed experiments, we show that our protocol achieves 20.66% and 22.82% higher efficiency on communication and computation overhead, respectively, compared to other contemporary competing protocols.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Vehicular Communications
Vehicular Communications Engineering-Electrical and Electronic Engineering
CiteScore
12.70
自引率
10.40%
发文量
88
审稿时长
62 days
期刊介绍: Vehicular communications is a growing area of communications between vehicles and including roadside communication infrastructure. Advances in wireless communications are making possible sharing of information through real time communications between vehicles and infrastructure. This has led to applications to increase safety of vehicles and communication between passengers and the Internet. Standardization efforts on vehicular communication are also underway to make vehicular transportation safer, greener and easier. The aim of the journal is to publish high quality peer–reviewed papers in the area of vehicular communications. The scope encompasses all types of communications involving vehicles, including vehicle–to–vehicle and vehicle–to–infrastructure. The scope includes (but not limited to) the following topics related to vehicular communications: Vehicle to vehicle and vehicle to infrastructure communications Channel modelling, modulating and coding Congestion Control and scalability issues Protocol design, testing and verification Routing in vehicular networks Security issues and countermeasures Deployment and field testing Reducing energy consumption and enhancing safety of vehicles Wireless in–car networks Data collection and dissemination methods Mobility and handover issues Safety and driver assistance applications UAV Underwater communications Autonomous cooperative driving Social networks Internet of vehicles Standardization of protocols.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信