Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2023
DOI: 10.1109/access.2023.3286016
|View full text |Cite
|
Sign up to set email alerts
|

Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF

Abstract: Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an advanced technology that can provide various services including autonomous driving, real-time creation of high-definition maps, and car sharing. In particular, a UAV-enabled ITS can be realized through the combination of traditional vehicular ad hoc networks (VANETs) and UAVs that can act as flying roadside units (RSUs) at the outskirts and monitor road conditions from predefined locations to spot car accidents and any law viol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…According to this model, an adversary is empowered to eavesdrop, delete, and modify messages transmitted through a public channel, allowing for the execution of various security attacks. These include performing impersonation, replay, and man-in-the-middle (MITM) attacks; acquiring a user's smart device to extract stored data through power analysis attacks [26][27][28]; legally creating avatars for impersonation attempts; and potentially functioning as an insider within the platform server. Additionally, we incorporate the more rigorous "Canetti-Krawczyk (CK) model" [29], which surpasses the assumptions of the DY model.…”
Section: Adversary Modelmentioning
confidence: 99%
“…According to this model, an adversary is empowered to eavesdrop, delete, and modify messages transmitted through a public channel, allowing for the execution of various security attacks. These include performing impersonation, replay, and man-in-the-middle (MITM) attacks; acquiring a user's smart device to extract stored data through power analysis attacks [26][27][28]; legally creating avatars for impersonation attempts; and potentially functioning as an insider within the platform server. Additionally, we incorporate the more rigorous "Canetti-Krawczyk (CK) model" [29], which surpasses the assumptions of the DY model.…”
Section: Adversary Modelmentioning
confidence: 99%
“…BAN logic [8] is a formal analysis method to prove the mutual authentication of the protocol. Thus, various security protocols analyzed the property of mutual authentication using BAN logic [31][32][33]. To analyze the proposed protocol using BAN logic, we define basic notations and descriptions in Table 4.…”
Section: Ban Logicmentioning
confidence: 99%
“…We analyze the mutual authentication of the proposed protocol using BAN logic [ 40 ]. Following [ 41 , 42 , 43 ], we define basic notations and descriptions of BAN logic in Table 2 .…”
Section: Security Analysismentioning
confidence: 99%
“… Computation costs comparison on user side devices [ 7 , 11 , 17 , 21 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 ]. …”
Section: Figurementioning
confidence: 99%