Loading…
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks
In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels fro...
Saved in:
Published in: | IEEE internet of things journal 2024-06, Vol.11 (12), p.22091-22106 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications. |
---|---|
ISSN: | 2327-4662 2327-4662 |
DOI: | 10.1109/JIOT.2024.3379556 |