Loading…
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks
In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels fro...
Saved in:
Published in: | IEEE internet of things journal 2024-06, Vol.11 (12), p.22091-22106 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573 |
container_end_page | 22106 |
container_issue | 12 |
container_start_page | 22091 |
container_title | IEEE internet of things journal |
container_volume | 11 |
creator | Guo, Zhenyang Cao, Jin Wang, Xinyi Zhang, Yinghui Niu, Ben Li, Hui |
description | In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications. |
doi_str_mv | 10.1109/JIOT.2024.3379556 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2024_3379556</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10478495</ieee_id><sourcerecordid>3065466048</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573</originalsourceid><addsrcrecordid>eNpNkF9PwjAUxRujiQT5ACY-NPF52K5ru_m2EFQMkQeB16br7qA4Nmy3GL-9RXjg6d6cnHP__BC6p2RMKcme3meL5TgmcTJmTGaciys0iFkso0SI-Pqiv0Uj73eEkBDjNBMDpFf5On_Gq2avmwZKnIOzusZr2FpTA869t74L-r_Q19rhvO-20HTW6M62Df40W9gDtg2elhvAk3Z_6DvbbPAHdD-t-_J36KbStYfRuQ7R6mW6nLxF88XrbJLPIxMnoouY1oWgZcpNVRFG49KYIJVxZgzohAkRDpaMFtIwURQskZRDSkBmIEiVccmG6PE09-Da7x58p3Zt75qwUjEieHifJGlw0ZPLuNZ7B5U6OLvX7ldRoo4w1RGmOsJUZ5gh83DKWAC48CcyTTLO_gBTTXAM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3065466048</pqid></control><display><type>article</type><title>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Guo, Zhenyang ; Cao, Jin ; Wang, Xinyi ; Zhang, Yinghui ; Niu, Ben ; Li, Hui</creator><creatorcontrib>Guo, Zhenyang ; Cao, Jin ; Wang, Xinyi ; Zhang, Yinghui ; Niu, Ben ; Li, Hui</creatorcontrib><description>In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2024.3379556</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Autonomous aerial vehicles ; Chebyshev approximation ; Communication ; Curves ; Cybersecurity ; Edge computing ; Efficiency ; Harnesses ; Intelligent transportation systems ; mutual authentication ; Protocols ; Security ; Servers ; Traffic management ; Transportation networks ; unmanned aerial vehicle (UAV) ; Unmanned aerial vehicles ; Vehicle-to-everything ; Vehicle-to-Everything (V2X) ; Vehicles ; Wireless networks ; zero trust</subject><ispartof>IEEE internet of things journal, 2024-06, Vol.11 (12), p.22091-22106</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573</cites><orcidid>0000-0003-1372-7252 ; 0000-0002-5764-3272 ; 0000-0003-2898-7495 ; 0000-0001-8310-7169 ; 0000-0003-3519-2674</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10478495$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Guo, Zhenyang</creatorcontrib><creatorcontrib>Cao, Jin</creatorcontrib><creatorcontrib>Wang, Xinyi</creatorcontrib><creatorcontrib>Zhang, Yinghui</creatorcontrib><creatorcontrib>Niu, Ben</creatorcontrib><creatorcontrib>Li, Hui</creatorcontrib><title>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications.</description><subject>Authentication</subject><subject>Autonomous aerial vehicles</subject><subject>Chebyshev approximation</subject><subject>Communication</subject><subject>Curves</subject><subject>Cybersecurity</subject><subject>Edge computing</subject><subject>Efficiency</subject><subject>Harnesses</subject><subject>Intelligent transportation systems</subject><subject>mutual authentication</subject><subject>Protocols</subject><subject>Security</subject><subject>Servers</subject><subject>Traffic management</subject><subject>Transportation networks</subject><subject>unmanned aerial vehicle (UAV)</subject><subject>Unmanned aerial vehicles</subject><subject>Vehicle-to-everything</subject><subject>Vehicle-to-Everything (V2X)</subject><subject>Vehicles</subject><subject>Wireless networks</subject><subject>zero trust</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpNkF9PwjAUxRujiQT5ACY-NPF52K5ru_m2EFQMkQeB16br7qA4Nmy3GL-9RXjg6d6cnHP__BC6p2RMKcme3meL5TgmcTJmTGaciys0iFkso0SI-Pqiv0Uj73eEkBDjNBMDpFf5On_Gq2avmwZKnIOzusZr2FpTA869t74L-r_Q19rhvO-20HTW6M62Df40W9gDtg2elhvAk3Z_6DvbbPAHdD-t-_J36KbStYfRuQ7R6mW6nLxF88XrbJLPIxMnoouY1oWgZcpNVRFG49KYIJVxZgzohAkRDpaMFtIwURQskZRDSkBmIEiVccmG6PE09-Da7x58p3Zt75qwUjEieHifJGlw0ZPLuNZ7B5U6OLvX7ldRoo4w1RGmOsJUZ5gh83DKWAC48CcyTTLO_gBTTXAM</recordid><startdate>20240615</startdate><enddate>20240615</enddate><creator>Guo, Zhenyang</creator><creator>Cao, Jin</creator><creator>Wang, Xinyi</creator><creator>Zhang, Yinghui</creator><creator>Niu, Ben</creator><creator>Li, Hui</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-1372-7252</orcidid><orcidid>https://orcid.org/0000-0002-5764-3272</orcidid><orcidid>https://orcid.org/0000-0003-2898-7495</orcidid><orcidid>https://orcid.org/0000-0001-8310-7169</orcidid><orcidid>https://orcid.org/0000-0003-3519-2674</orcidid></search><sort><creationdate>20240615</creationdate><title>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</title><author>Guo, Zhenyang ; Cao, Jin ; Wang, Xinyi ; Zhang, Yinghui ; Niu, Ben ; Li, Hui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Authentication</topic><topic>Autonomous aerial vehicles</topic><topic>Chebyshev approximation</topic><topic>Communication</topic><topic>Curves</topic><topic>Cybersecurity</topic><topic>Edge computing</topic><topic>Efficiency</topic><topic>Harnesses</topic><topic>Intelligent transportation systems</topic><topic>mutual authentication</topic><topic>Protocols</topic><topic>Security</topic><topic>Servers</topic><topic>Traffic management</topic><topic>Transportation networks</topic><topic>unmanned aerial vehicle (UAV)</topic><topic>Unmanned aerial vehicles</topic><topic>Vehicle-to-everything</topic><topic>Vehicle-to-Everything (V2X)</topic><topic>Vehicles</topic><topic>Wireless networks</topic><topic>zero trust</topic><toplevel>online_resources</toplevel><creatorcontrib>Guo, Zhenyang</creatorcontrib><creatorcontrib>Cao, Jin</creatorcontrib><creatorcontrib>Wang, Xinyi</creatorcontrib><creatorcontrib>Zhang, Yinghui</creatorcontrib><creatorcontrib>Niu, Ben</creatorcontrib><creatorcontrib>Li, Hui</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Guo, Zhenyang</au><au>Cao, Jin</au><au>Wang, Xinyi</au><au>Zhang, Yinghui</au><au>Niu, Ben</au><au>Li, Hui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2024-06-15</date><risdate>2024</risdate><volume>11</volume><issue>12</issue><spage>22091</spage><epage>22106</epage><pages>22091-22106</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of transportation systems. Modern transportation networks have evolved into 3-D structures, including bridges and tunnels from traditional 2-D ones, which poses a challenge to fixed base stations-based networks reliant on supporting continuous and seamless coverage. Against this backdrop, unmanned aerial vehicles (UAVs) play a crucial role in developing multidimensional wireless networks due to their flexibility and functionality. This article proposes a UAV-assisted vehicle authentication (UAVA) scheme. It harnesses the efficiency of edge computing and the security of zero-trust architecture, focusing on enhancing the safety and efficiency of V2X communications. The UAVA scheme employs Chebyshev chaotic mapping and elliptic curve cryptography to strengthen communication security, adapting to the dynamic interactions between vehicles and UAVs. We validate the security using BAN logic and the Scyther tool and assess performance through experiments in a real hardware environment. The results indicate that UAVA offers higher security and lower communication overhead in serverless scenarios compared to existing solutions. These comprehensive evaluations show the potential of UAVA for application in intelligent transportation systems, especially in ensuring secure communications.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2024.3379556</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-1372-7252</orcidid><orcidid>https://orcid.org/0000-0002-5764-3272</orcidid><orcidid>https://orcid.org/0000-0003-2898-7495</orcidid><orcidid>https://orcid.org/0000-0001-8310-7169</orcidid><orcidid>https://orcid.org/0000-0003-3519-2674</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2327-4662 |
ispartof | IEEE internet of things journal, 2024-06, Vol.11 (12), p.22091-22106 |
issn | 2327-4662 2327-4662 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JIOT_2024_3379556 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Authentication Autonomous aerial vehicles Chebyshev approximation Communication Curves Cybersecurity Edge computing Efficiency Harnesses Intelligent transportation systems mutual authentication Protocols Security Servers Traffic management Transportation networks unmanned aerial vehicle (UAV) Unmanned aerial vehicles Vehicle-to-everything Vehicle-to-Everything (V2X) Vehicles Wireless networks zero trust |
title | UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T19%3A11%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=UAVA:%20Unmanned%20Aerial%20Vehicle%20Assisted%20Vehicular%20Authentication%20Scheme%20in%20Edge%20Computing%20Networks&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Guo,%20Zhenyang&rft.date=2024-06-15&rft.volume=11&rft.issue=12&rft.spage=22091&rft.epage=22106&rft.pages=22091-22106&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2024.3379556&rft_dat=%3Cproquest_cross%3E3065466048%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c246t-3aab61d85cff0312dcc3aad29ccea4366051731b7c36bb34715e80e79e60f9573%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3065466048&rft_id=info:pmid/&rft_ieee_id=10478495&rfr_iscdi=true |