Loading…

UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks

In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels fro...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal 2024-06, Vol.11 (12), p.22091-22106
Main Authors: Guo, Zhenyang, Cao, Jin, Wang, Xinyi, Zhang, Yinghui, Niu, Ben, Li, Hui
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573
container_end_page 22106
container_issue 12
container_start_page 22091
container_title IEEE internet of things journal
container_volume 11
creator Guo, Zhenyang
Cao, Jin
Wang, Xinyi
Zhang, Yinghui
Niu, Ben
Li, Hui
description In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications.
doi_str_mv 10.1109/JIOT.2024.3379556
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2024_3379556</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10478495</ieee_id><sourcerecordid>3065466048</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573</originalsourceid><addsrcrecordid>eNpNkF9PwjAUxRujiQT5ACY-NPF52K5ru_m2EFQMkQeB16br7qA4Nmy3GL-9RXjg6d6cnHP__BC6p2RMKcme3meL5TgmcTJmTGaciys0iFkso0SI-Pqiv0Uj73eEkBDjNBMDpFf5On_Gq2avmwZKnIOzusZr2FpTA869t74L-r_Q19rhvO-20HTW6M62Df40W9gDtg2elhvAk3Z_6DvbbPAHdD-t-_J36KbStYfRuQ7R6mW6nLxF88XrbJLPIxMnoouY1oWgZcpNVRFG49KYIJVxZgzohAkRDpaMFtIwURQskZRDSkBmIEiVccmG6PE09-Da7x58p3Zt75qwUjEieHifJGlw0ZPLuNZ7B5U6OLvX7ldRoo4w1RGmOsJUZ5gh83DKWAC48CcyTTLO_gBTTXAM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3065466048</pqid></control><display><type>article</type><title>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Guo, Zhenyang ; Cao, Jin ; Wang, Xinyi ; Zhang, Yinghui ; Niu, Ben ; Li, Hui</creator><creatorcontrib>Guo, Zhenyang ; Cao, Jin ; Wang, Xinyi ; Zhang, Yinghui ; Niu, Ben ; Li, Hui</creatorcontrib><description>In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2024.3379556</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Autonomous aerial vehicles ; Chebyshev approximation ; Communication ; Curves ; Cybersecurity ; Edge computing ; Efficiency ; Harnesses ; Intelligent transportation systems ; mutual authentication ; Protocols ; Security ; Servers ; Traffic management ; Transportation networks ; unmanned aerial vehicle (UAV) ; Unmanned aerial vehicles ; Vehicle-to-everything ; Vehicle-to-Everything (V2X) ; Vehicles ; Wireless networks ; zero trust</subject><ispartof>IEEE internet of things journal, 2024-06, Vol.11 (12), p.22091-22106</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573</cites><orcidid>0000-0003-1372-7252 ; 0000-0002-5764-3272 ; 0000-0003-2898-7495 ; 0000-0001-8310-7169 ; 0000-0003-3519-2674</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10478495$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Guo, Zhenyang</creatorcontrib><creatorcontrib>Cao, Jin</creatorcontrib><creatorcontrib>Wang, Xinyi</creatorcontrib><creatorcontrib>Zhang, Yinghui</creatorcontrib><creatorcontrib>Niu, Ben</creatorcontrib><creatorcontrib>Li, Hui</creatorcontrib><title>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications.</description><subject>Authentication</subject><subject>Autonomous aerial vehicles</subject><subject>Chebyshev approximation</subject><subject>Communication</subject><subject>Curves</subject><subject>Cybersecurity</subject><subject>Edge computing</subject><subject>Efficiency</subject><subject>Harnesses</subject><subject>Intelligent transportation systems</subject><subject>mutual authentication</subject><subject>Protocols</subject><subject>Security</subject><subject>Servers</subject><subject>Traffic management</subject><subject>Transportation networks</subject><subject>unmanned aerial vehicle (UAV)</subject><subject>Unmanned aerial vehicles</subject><subject>Vehicle-to-everything</subject><subject>Vehicle-to-Everything (V2X)</subject><subject>Vehicles</subject><subject>Wireless networks</subject><subject>zero trust</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpNkF9PwjAUxRujiQT5ACY-NPF52K5ru_m2EFQMkQeB16br7qA4Nmy3GL-9RXjg6d6cnHP__BC6p2RMKcme3meL5TgmcTJmTGaciys0iFkso0SI-Pqiv0Uj73eEkBDjNBMDpFf5On_Gq2avmwZKnIOzusZr2FpTA869t74L-r_Q19rhvO-20HTW6M62Df40W9gDtg2elhvAk3Z_6DvbbPAHdD-t-_J36KbStYfRuQ7R6mW6nLxF88XrbJLPIxMnoouY1oWgZcpNVRFG49KYIJVxZgzohAkRDpaMFtIwURQskZRDSkBmIEiVccmG6PE09-Da7x58p3Zt75qwUjEieHifJGlw0ZPLuNZ7B5U6OLvX7ldRoo4w1RGmOsJUZ5gh83DKWAC48CcyTTLO_gBTTXAM</recordid><startdate>20240615</startdate><enddate>20240615</enddate><creator>Guo, Zhenyang</creator><creator>Cao, Jin</creator><creator>Wang, Xinyi</creator><creator>Zhang, Yinghui</creator><creator>Niu, Ben</creator><creator>Li, Hui</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-1372-7252</orcidid><orcidid>https://orcid.org/0000-0002-5764-3272</orcidid><orcidid>https://orcid.org/0000-0003-2898-7495</orcidid><orcidid>https://orcid.org/0000-0001-8310-7169</orcidid><orcidid>https://orcid.org/0000-0003-3519-2674</orcidid></search><sort><creationdate>20240615</creationdate><title>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</title><author>Guo, Zhenyang ; Cao, Jin ; Wang, Xinyi ; Zhang, Yinghui ; Niu, Ben ; Li, Hui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Authentication</topic><topic>Autonomous aerial vehicles</topic><topic>Chebyshev approximation</topic><topic>Communication</topic><topic>Curves</topic><topic>Cybersecurity</topic><topic>Edge computing</topic><topic>Efficiency</topic><topic>Harnesses</topic><topic>Intelligent transportation systems</topic><topic>mutual authentication</topic><topic>Protocols</topic><topic>Security</topic><topic>Servers</topic><topic>Traffic management</topic><topic>Transportation networks</topic><topic>unmanned aerial vehicle (UAV)</topic><topic>Unmanned aerial vehicles</topic><topic>Vehicle-to-everything</topic><topic>Vehicle-to-Everything (V2X)</topic><topic>Vehicles</topic><topic>Wireless networks</topic><topic>zero trust</topic><toplevel>online_resources</toplevel><creatorcontrib>Guo, Zhenyang</creatorcontrib><creatorcontrib>Cao, Jin</creatorcontrib><creatorcontrib>Wang, Xinyi</creatorcontrib><creatorcontrib>Zhang, Yinghui</creatorcontrib><creatorcontrib>Niu, Ben</creatorcontrib><creatorcontrib>Li, Hui</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Guo, Zhenyang</au><au>Cao, Jin</au><au>Wang, Xinyi</au><au>Zhang, Yinghui</au><au>Niu, Ben</au><au>Li, Hui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2024-06-15</date><risdate>2024</risdate><volume>11</volume><issue>12</issue><spage>22091</spage><epage>22106</epage><pages>22091-22106</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2024.3379556</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-1372-7252</orcidid><orcidid>https://orcid.org/0000-0002-5764-3272</orcidid><orcidid>https://orcid.org/0000-0003-2898-7495</orcidid><orcidid>https://orcid.org/0000-0001-8310-7169</orcidid><orcidid>https://orcid.org/0000-0003-3519-2674</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2327-4662
ispartof IEEE internet of things journal, 2024-06, Vol.11 (12), p.22091-22106
issn 2327-4662
2327-4662
language eng
recordid cdi_crossref_primary_10_1109_JIOT_2024_3379556
source IEEE Electronic Library (IEL) Journals
subjects Authentication
Autonomous aerial vehicles
Chebyshev approximation
Communication
Curves
Cybersecurity
Edge computing
Efficiency
Harnesses
Intelligent transportation systems
mutual authentication
Protocols
Security
Servers
Traffic management
Transportation networks
unmanned aerial vehicle (UAV)
Unmanned aerial vehicles
Vehicle-to-everything
Vehicle-to-Everything (V2X)
Vehicles
Wireless networks
zero trust
title UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T19%3A11%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=UAVA:%20Unmanned%20Aerial%20Vehicle%20Assisted%20Vehicular%20Authentication%20Scheme%20in%20Edge%20Computing%20Networks&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Guo,%20Zhenyang&rft.date=2024-06-15&rft.volume=11&rft.issue=12&rft.spage=22091&rft.epage=22106&rft.pages=22091-22106&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2024.3379556&rft_dat=%3Cproquest_cross%3E3065466048%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3065466048&rft_id=info:pmid/&rft_ieee_id=10478495&rfr_iscdi=true