• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhang, Zhan (Zhang, Zhan.) [1] | Li, Xinghua (Li, Xinghua.) [2] | Wang, Yunwei (Wang, Yunwei.) [3] | Miao, Yinbin (Miao, Yinbin.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Weng, Jian (Weng, Jian.) [6] | Deng, Robert H. (Deng, Robert H..) [7]

Indexed by:

EI

Abstract:

The development of unmanned aerial vehicle (UAV) technology has been advancing rapidly and is widely applied in various domains. Compared to a single UAV, the multi-UAV system, known as the UAV Ad Hoc Network (UANET), can collaborate to accomplish complex tasks more efficiently. Due to the UAVs communicating through open wireless channels, they are vulnerable to various attacks. Group key agreement protocols are often used to guarantee the security of UANET communication. However, the high dynamics of UAVs and the instability of the wireless links often result in certain UAVs temporarily losing connection with the group, rendering them incapable of participating in the group key agreement process. Regrettably, existing literature on group key agreement does not consider this issue, which makes them not applicable to UANET. To address this issue, we propose a threshold authenticated group key agreement protocol (TAGKA) that can resist the disconnection of group members. Then, considering that the temporarily disconnected UAVs need to obtain the latest group key after the communication links are recovered, we design a group key recovery protocol. The security of the scheme is proved under the random oracle model. Moreover, formal security verification using the Tamarin and rigorous informal security analysis is also performed. Finally, we use NS-3 to simulate the protocol, and the experimental results show that our protocol can be effectively applied to UANET. © 1967-2012 IEEE.

Keyword:

Ad hoc networks Antennas Autonomous vehicles Job analysis Network security Unmanned aerial vehicles (UAV) Vehicle to vehicle communications Wireless sensor networks

Community:

  • [ 1 ] [Zhang, Zhan]Xidian University, State Key Laboratory of Integrated Services Networks, The School of Cyber Engineering, Xi'an; 710071, China
  • [ 2 ] [Li, Xinghua]Xidian University, State Key Laboratory of Integrated Services Networks, The School of Cyber Engineering, Xi'an; 710071, China
  • [ 3 ] [Li, Xinghua]Ministry of Education, Engineering Research Center of Big Data Security, Xi'an; 710071, China
  • [ 4 ] [Wang, Yunwei]Xidian University, State Key Laboratory of Integrated Services Networks, The School of Cyber Engineering, Xi'an; 710071, China
  • [ 5 ] [Miao, Yinbin]Xidian University, State Key Laboratory of Integrated Services Networks, The School of Cyber Engineering, Xi'an; 710071, China
  • [ 6 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Fuzhou; 350108, China
  • [ 7 ] [Weng, Jian]Jinan University, College of Cyber Security, Guangzhou; 510632, China
  • [ 8 ] [Deng, Robert H.]Singapore Management University, School of Information Systems, 178902, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Vehicular Technology

ISSN: 0018-9545

Year: 2023

Issue: 11

Volume: 72

Page: 14987-15001

6 . 1

JCR@2023

6 . 1 0 0

JCR@2023

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:115/11053015
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1