Computer Science ›› 2016, Vol. 43 ›› Issue (1): 178-180.doi: 10.11896/j.issn.1002-137X.2016.01.040

Previous Articles     Next Articles

Authentication Protocol for Cooperation of Unmanned Vehicles

NIU Wen-sheng, LI Ya-hui and GUO Peng   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The cooperation of unmanned vehicles needs dynamic networking for the secure group communication.Based on the different security domain of wireless environments,an authentication protocol with identity protection for coopera-tion of unmanned vehicles was proposed,which consists of a four-party security information exchange protocol for the data transmission between nodes in the dynamic network and an ID-based anonymous authentication scheme for the secure session keys of a node,which supports the combination of the decryption process and the identity protection.Finally,it is shown that the session key has the security characters of unforgeability,confidentiality and non-repudiation,and the new protocol has a secure,flexible and efficient method of key management for dynamic networking.

Key words: Unmanned vehicles,Dynamical networking,Group communication,Multilevel secure,Key management

[1] Mark C C.A Discussion of a Modular Unmanned Demonstration Air Vehicle:A GARD CP2600[R].2000
[2] John A T.The Air Force is Pursuing Uninhabited Combat Air Vehicles in a Big Way[J].Air Force Magazine,2001,84(8):64
[3] Jones M C A.Unmanned Aerial Vehicles (UAVS)- an Assessment of Historical Operations and Future Possibilities:AU/ACSC/0230D/97-03[R].1997
[4] Siddiqui M S,Seon V C.Security Issues in Wireless Mesh Networks[C]∥IEEE International Conference on Multimedia and Ubiquitous Engineering (MUEy07).2007
[5] Zhang W,Wang Z,Das S K,et al.Security Issues in Wireless Mesh Networks[M]∥Wireless Mesh Networks:Architectures and protocols.New York:Springer,2008
[6] IEEE Standard for Local and Metropolitan Area Networks Part 16:Air Interface for Fixed Broadband Wireless Access Systems:IEEE Std 802.16-2004[S].2004:1-857
[7] Shamir A.Identity-based cryptography and signature schemes[M]∥Advances in Cryptology(CRYPTO’84):Lecture Notes in Computer Science 196.Berlin:Springer-Verlag,1985:47-53
[8] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[M]∥Advances in Cryptology(CRYPTO 2001):Lecture Notes in Computer Science.Berlin:Springer-Verlag,2001:213-229
[9] Ke Zeng.Pseudonymous PKI for ubiquitous computing[M]∥Public Key Infrastructure:Lecture Notes in Computer Science.Springer Berlin Heideleberg,2006:207-222
[10] Tu Jun-yang.Research on Synthesis Data Links of Multi-UAV Cooperative Combat[C]∥China Unmanned Aircraft Systems Summit 2008.Beijing,2008:735-739
[11] Wang Gang,Wen Tao,Guo Quan,et al.An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J].Journal of Computer Research and Development,2010,47(5):911-920
[12] Hu Liang,Liu Zhe-li,Sun Tao,et al.Survey of Security on Identity-Based Cryptography[J].Journal of Computer Research and Development,2009,46(9):1537-1548
[13] Shi Rong-hua,Yuan Qian.A secure hierarchical key manage-ment scheme in mobile ad hoc networks[J].Journal of Central South University (Science and Technology),2010,41(1):201-206
[14] Lauter K.The advantages of elliptic curve cryptography forwireless security[J].IEEE Wireless Communications,2004,11(1):62-67

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!