TY - JOUR
T1 - Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment
AU - Bera, Basudeb
AU - Das, Ashok Kumar
AU - Garg, Sahil
AU - Jalil Piran, Md
AU - Hossain, M. Shamim
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2022/2/15
Y1 - 2022/2/15
N2 - Surveillance drones, called as unmanned aerial vehicles (UAVs), are aircrafts that are utilized to collect video recordings, still images, or live video of the targets, such as vehicles, people or specific areas. Particularly in battlefield surveillance, there is high possibility of eavesdropping, inserting, modifying or deleting the messages during communications among the deployed drones and ground station server (GSS). This leads to launch several potential attacks by an adversary, such as main-in-middle, impersonation, drones hijacking, replay attacks, etc. Moreover, anonymity and untraceability are two crucial security properties that need to be maintained in battlefield surveillance communication environment. To deal with such a crucial security problem, we propose a new access control protocol for battlefield surveillance in drone-assisted Internet of Things (IoT) environment, called ACPBS-IoT. Through the detailed security analysis using formal and informal (nonmathematical), and also the formal security verification under automated software simulation tool, we show that the proposed ACPBS-IoT can resist several potential attacks needed in a battlefield surveillance scenario. Furthermore, the testbed experiments for various cryptographic primitives have been performed for measuring the execution time. Finally, a detailed comparative study on communication and computational overheads, and security, as well as functionality features, reveals that the proposed ACPBS-IoT provides superior security and more functionality features, and better or comparable overheads than other existing competing access control schemes.
AB - Surveillance drones, called as unmanned aerial vehicles (UAVs), are aircrafts that are utilized to collect video recordings, still images, or live video of the targets, such as vehicles, people or specific areas. Particularly in battlefield surveillance, there is high possibility of eavesdropping, inserting, modifying or deleting the messages during communications among the deployed drones and ground station server (GSS). This leads to launch several potential attacks by an adversary, such as main-in-middle, impersonation, drones hijacking, replay attacks, etc. Moreover, anonymity and untraceability are two crucial security properties that need to be maintained in battlefield surveillance communication environment. To deal with such a crucial security problem, we propose a new access control protocol for battlefield surveillance in drone-assisted Internet of Things (IoT) environment, called ACPBS-IoT. Through the detailed security analysis using formal and informal (nonmathematical), and also the formal security verification under automated software simulation tool, we show that the proposed ACPBS-IoT can resist several potential attacks needed in a battlefield surveillance scenario. Furthermore, the testbed experiments for various cryptographic primitives have been performed for measuring the execution time. Finally, a detailed comparative study on communication and computational overheads, and security, as well as functionality features, reveals that the proposed ACPBS-IoT provides superior security and more functionality features, and better or comparable overheads than other existing competing access control schemes.
KW - Access control
KW - Internet of Things (IoT)
KW - battlefield surveillance
KW - drones
KW - key agreement
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85099216108&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2020.3049003
DO - 10.1109/JIOT.2020.3049003
M3 - Article
AN - SCOPUS:85099216108
VL - 9
SP - 2708
EP - 2721
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
SN - 2327-4662
IS - 4
ER -