Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Deebak, B. D. | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.accessioned | 2023-05-17T00:41:12Z | - |
dc.date.available | 2023-05-17T00:41:12Z | - |
dc.date.created | 2023-05-15 | - |
dc.date.issued | 2023-04 | - |
dc.identifier.issn | 1389-1286 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/87784 | - |
dc.description.abstract | In the diverse range of surveillance applications, large-scale deployment of next-generation communication technologies and the fast-growing development of unmanned aerial vehicles (UAVs) are envisioned as key in-novations in the adoption of beyond-fifth generation (B5G) and 6G communication. Due to its self-reliance and versatility, a complex communication network can be formulated strategically to improve the application fea-tures of drone technology, including search-and-rescue, mission-critical services, and military surveillance. In recent times, technological advancements in hardware and software infrastructure have gained momentum to-ward seamless information interaction in aerial communication. Unfortunately, the recurrent process of user authentication causes severe communication instability in an unmanned aerial ad hoc network (UAANET) leading to some serious cyber threats, such as buffer overflow, denial of service, and spoofing. Therefore, building secure and reliable authentication is inevitable in order to protect drone-aided healthcare service en-vironments. To protect aerial zones and improve security efficiency, this paper designs robust lightweight secure multi-factor authentication (RL-SMFA). The proposed RL-SMFA utilizes an AI-enabled, secure analytics phase to verify the genuineness of drone swarms for the ground control station. While protecting communication with drone vehicles, we also observe that power consumption by drones is reduced to a large extent. Using formal verification under a random oracle model, we show that the proposed RL-SMFA can functionally resist system vulnerabilities and constructively decrease the computation and communication costs of the UAANET. Lastly, the simulation study using ns3 shows that the proposed RL-SMFA achieves better performance efficiencies in terms of throughput rate, packet delivery ratio, and end-to-end delay than other state-of-the-art approaches to discovering a proper link establishment. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.relation.isPartOf | COMPUTER NETWORKS | - |
dc.title | Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000972624000001 | - |
dc.identifier.doi | 10.1016/j.comnet.2023.109664 | - |
dc.identifier.bibliographicCitation | COMPUTER NETWORKS, v.225 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85149401041 | - |
dc.citation.title | COMPUTER NETWORKS | - |
dc.citation.volume | 225 | - |
dc.contributor.affiliatedAuthor | Deebak, B. D. | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Unmanned aerial vehicle | - |
dc.subject.keywordAuthor | B5G | - |
dc.subject.keywordAuthor | 6G | - |
dc.subject.keywordAuthor | Aerial ad hoc network | - |
dc.subject.keywordAuthor | Multi -factor authentication | - |
dc.subject.keywordAuthor | Artificial intelligence | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | SECURE | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | IOT | - |
dc.subject.keywordPlus | CHALLENGES | - |
dc.subject.keywordPlus | COMMUNICATION | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | PROTOCOL | - |
dc.subject.keywordPlus | DESIGN | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.