Secure, Robust, and Energy-Efficient Authenticated Data Sharing in UAV-Assisted 6G Networks (2402.11382v1)
Abstract: This paper confronts the pressing challenges of sixth-generation (6G) wireless communication networks by harnessing the unique capabilities of Unmanned Aerial Vehicles (UAVs). With the ambitious promises of 6G, including ultra-reliable 1 Tbps data delivery and ultra-low latency, the demand for innovative solutions becomes imperative. Traditional terrestrial base stations, though effective, exhibit limitations in scenarios requiring ubiquitous connectivity, prompting the integration of UAVs. In response to these challenges, we introduce a comprehensive solution. This involves UAVs collaboratively downloading desired content from service providers, and subsequently establishing secure connections with users for efficient content exchange. Accordingly, we introduce two new protocols: a collaborative group data downloading scheme among UAVs called SeGDS, and SeDDS for secure direct data sharing through out-of-band autonomous Device-to-Device (D2D) communication. Leveraging certificateless signcryption and certificateless multi-receiver encryption, these protocols offer lightweight, certificate-free solutions with features such as user revocation, non-repudiation, and mutual authentication. Prioritizing high availability, the proposed protocols effectively detect Denial of Service (DoS) and free riding attacks. A thorough evaluation underscores the superiority of the proposed protocols in both security and efficiency over existing models; SeDDS reduces overall computation by 3x, imposing a lighter communication load on UAVs, while SeGDS meets swarm UAV security requirements, reducing communication costs by 4x with low computation cost.
- C.-X. Wang, X. You, X. Gao, X. Zhu, Z. Li, C. Zhang, H. Wang, Y. Huang, Y. Chen, H. Haas et al., “On the road to 6g: Visions, requirements, key technologies and testbeds,” IEEE Communications Surveys & Tutorials, 2023.
- M. A. Khan, N. Kumar, S. A. H. Mohsan, W. U. Khan, M. M. Nasralla, M. H. Alsharif, J. Żywiołek, and I. Ullah, “Swarm of uavs for network management in 6g: A technical review,” IEEE Transactions on Network and Service Management, 2022.
- R. Zhang, R. Lu, X. Cheng, N. Wang, and L. Yang, “A uav-enabled data dissemination protocol with proactive caching and file sharing in v2x networks,” IEEE Transactions on Communications, vol. 69, no. 6, pp. 3930–3942, 2021.
- J. Bai, J. Gui, G. Huang, M. Dong, T. Wang, S. Zhang, and A. Liu, “A lowcost uav task offloading scheme based on trustable and trackable data routing,” IEEE Transactions on Intelligent Vehicles, 2023.
- N. Lin, Y. Liu, L. Zhao, D. O. Wu, and Y. Wang, “An adaptive uav deployment scheme for emergency networking,” IEEE Transactions on Wireless Communications, vol. 21, no. 4, pp. 2383–2398, 2021.
- Y. Gao, J. Cao, P. Wang, J. Yin, M. He, M. Zhao, M. Peng, S. Hu, Y. Sun, J. Wang et al., “Intelligent uav based flexible 5g emergency networks: Field trial and system level results,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020, pp. 138–143.
- B. Nassi, R. Bitton, R. Masuoka, A. Shabtai, and Y. Elovici, “Sok: Security and privacy in the age of commercial drones,” in 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021, pp. 1434–1451.
- D. Koisser, R. Mitev, M. Chilese, and A.-R. Sadeghi, “Don’t shoot the messenger: Localization prevention of satellite internet users,” in 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 2024, pp. 66–66.
- M. Adil, M. A. Jan, Y. Liu, H. Abulkasim, A. Farouk, and H. Song, “A systematic survey: security threats to uav-aided iot applications, taxonomy, current challenges and requirements with future research directions,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 1437–1455, 2022.
- A. V. Shvetsov, S. H. Alsamhi, A. Hawbani, S. Kumar, S. Srivastava, S. Agarwal, N. S. Rajput, A. A. Alammari, and F. Nashwan, “Federated learning meets intelligence reflection surface in drones for enabling 6g networks: challenges and opportunities,” IEEE Access, 2023.
- 3rd Generation partnership project (3GPP), “5g; security architecture and procedures for 5g system (3gpp ts 33.501 version 17.5.0 release 17),” Tech. Rep., 2022.
- M. S. M. Gismalla, A. I. Azmi, M. R. B. Salim, M. F. L. Abdullah, F. Iqbal, W. A. Mabrouk, M. B. Othman, A. Y. Ashyap, and A. S. M. Supa’at, “Survey on device to device (d2d) communication for 5gb/6g networks: Concept, applications, challenges, and future directions,” IEEE Access, vol. 10, pp. 30 792–30 821, 2022.
- S. Zhang, H. Zhang, and L. Song, “Beyond d2d: Full dimension uav-to-everything communications in 6g,” IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 6592–6602, 2020.
- J. Cui, J. Chen, H. Zhong, J. Zhang, and L. Liu, “Reliable and efficient content sharing for 5g-enabled vehicular networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 2, pp. 1247–1259, 2020.
- A. Zhang, L. Wang, X. Ye, and X. Lin, “Light-weight and robust security-aware d2d-assist data transmission protocol for mobile-health systems,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 662–675, 2016.
- S. H. Islam, M. K. Khan, and A. M. Al-Khouri, “Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing,” Security and communication networks, vol. 8, no. 13, pp. 2214–2231, 2015.
- D. Dolev and A. Yao, “On the security of public key protocols,” IEEE Transactions on information theory, vol. 29, no. 2, pp. 198–208, 1983.
- M. O. Ozmen, H. Farrukh, H. Kim, A. Bianchi, and Z. B. Celik, “Short: Rethinking secure pairing in drone swarms,” ”Symposium on Vehicles Security and Privacy (VehicleSec)”, 2023.
- P. Wang, C.-M. Chen, S. Kumari, M. Shojafar, R. Tafazolli, and Y.-N. Liu, “Hdma: Hybrid d2d message authentication scheme for 5g-enabled vanets,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 8, pp. 5071–5080, 2020.
- J. Zhang, X. Liu, J. Cui, H. Zhong, L. Wei, I. Bolodurina, and D. He, “Cbdds: Secure and revocable cache-based distributed data sharing for vehicular networks,” IEEE Transactions on Mobile Computing, 2023.
- Y. Ko, J. Kim, D. G. Duguma, P. V. Astillo, I. You, and G. Pau, “Drone secure communication protocol for future sensitive applications in military zone,” Sensors, vol. 21, no. 6, p. 2057, 2021.
- J. Cui, L. Wei, H. Zhong, J. Zhang, Y. Xu, and L. Liu, “Edge computing in vanets-an efficient and privacy-preserving cooperative downloading scheme,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1191–1204, 2020.
- H. Tan and I. Chung, “Rsu-aided remote v2v message dissemination employing secure group association for uav-assisted vanets,” Electronics, vol. 10, no. 5, p. 548, 2021.
- H. Luo, Y. Wu, G. Sun, H. Yu, and M. Guizani, “Escm: an efficient and secure communication mechanism for uav networks,” IEEE Transactions on Network and Service Management, 2024.
- J. Wang, Z. Jiao, J. Chen, X. Hou, T. Yang, and D. Lan, “Blockchain-aided secure access control for uav computing networks,” IEEE Transactions on Network Science and Engineering, 2023.
- H. Tan, W. Zheng, and P. Vijayakumar, “Secure and efficient authenticated key management scheme for uav-assisted infrastructure-less iovs,” IEEE Transactions on Intelligent Transportation Systems, 2023.
- J. Cui, X. Liu, H. Zhong, J. Zhang, L. Wei, I. Bolodurina, and D. He, “A practical and provably secure authentication and key agreement scheme for uav-assisted vanets for emergency rescue,” IEEE Transactions on Network Science and Engineering, 2023.
- J. Zhang, J. Cui, H. Zhong, I. Bolodurina, and L. Liu, “Intelligent drone-assisted anonymous authentication and key agreement for 5g/b5g vehicular ad-hoc networks,” IEEE transactions on network science and engineering, vol. 8, no. 4, pp. 2982–2994, 2020.
- A. Mohseni-Ejiyeh, M. Ashouri-Talouki, and M. Mahdavi, “An incentive-aware lightweight secure data sharing scheme for d2d communication in 5g cellular networks.” ISeCure, vol. 10, no. 1, 2018.
- J. Cao, P. Yu, M. Ma, and W. Gao, “Fast authentication and data transfer scheme for massive nb-iot devices in 3gpp 5g network,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1561–1575, 2018.
- H. Zhong, L. Wang, J. Cui, J. Zhang, and I. Bolodurina, “Secure edge computing-assisted video reporting service in 5g-enabled vehicular networks,” IEEE Transactions on Information Forensics and Security, 2023.