Skip to main content

TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14493))

  • 85 Accesses

Abstract

Edge-Integrated Unmanned Aerial Vehicles (UAVs) delivery systems have demonstrated the advantage of higher efficiency and lower latency in comparison with traditional intelligent delivery systems. But with its rapid development, a series of security and privacy issues have also emerged. For instance, it is of vital importance to maintain data safety due to UAVs exchanging sensitive data with servers through public channels, attackers can easily gain access to sensitive information by launching attacks including man-in-the-middle and impersonation attacks. Additionally, the requirements of frequent authentications between UAVs and edge servers can result in increased computation overhead, while UAVs are fast-moving and resource-constrained, and excessive computational overhead can degrade the user experience. To address these challenges, this paper proposes a Two-Stage Biometric-Assisted Authentication Framework (TBAF) that enhances security and efficiency. In TBAF, a novel secret sharing method is designed to distribute storage biometric templates with protection, ensuring the secret values which are biometric templates can only be accessed by authorized parties. Additionally, the two-stage authentication protocol reduces computation and communication overhead. Extensive formal and informal security analysis confirms the superior performance of the proposed protocol compared to existing solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee, S., Kang, Y., Prabhu, V.: Smart logistics: distributed control of green crowdsourced parcel services. Int. J. Prod. Res. 54(23), 6956–6968 (2016)

    Article  Google Scholar 

  2. Suma, S., Mehmood, R., Albugami, N., Katib, I., Albeshri, A.: Enabling next generation logistics and planning for smarter societies. Procedia Comput. Sci. 109, 1122–1127 (2017)

    Article  Google Scholar 

  3. Zhang, J., Cui, J., Zhong, H., Bolodurina, I., Lu, L.: Intelligent drone-assisted anonymous authentication and key agreement for 5G/B5G vehicular ad-hoc networks. IEEE Trans. Netw. Sci. Eng. 8(5), 2982–2994 (2020)

    MathSciNet  Google Scholar 

  4. Alladi, T., Bansal, G., Chamola, V., Guizani, M.: SecAuthUAV: a novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Trans. Veh. Technol. 69(12), 15068–15077 (2020)

    Article  Google Scholar 

  5. Shen, M., Lu, H., Wang, F., Liu, H., Zhu, L.: Secure and efficient blockchain-assisted authentication for edge-integrated internet-of-vehicles. IEEE Trans. Veh. Technol. 71(11), 12250–12263 (2022)

    Article  Google Scholar 

  6. Xu, J., Liu, X., Li, X., Zhang, L., Yang, Y.: EXPRESS: an energy-efficient and secure framework for mobile edge computing and blockchain based smart systems. In 35th IEEE/ACM International Conference on Automated Software Engineering, pp. 1283–1286 (2020)

    Google Scholar 

  7. Alzahrani, B., Barnawi, A., Chaudhry, S.: A resource-friendly authentication protocol for UAV-based massive crowd management systems. Secur. Commun. Netw. 2021, 1–12 (2021)

    Article  Google Scholar 

  8. Lin, C., He, D., Kumar, N., Choo, K., Vinel, A., Huang, X.: Security and privacy for the internet of drones: challenges and solutions. IEEE Commun. Mag. 56(1), 64–69 (2018)

    Article  Google Scholar 

  9. Abualigah, L., Diabat, A., Sumari, P., Gandomi, A.: Applications, deployments, and integration of internet of drones (IoD): a review. IEEE Sens. J. 21(22), 25532–25546 (2021)

    Article  Google Scholar 

  10. Tian, Y., Yuan, J., Song, H.: Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 48, 1–11 (2019)

    Google Scholar 

  11. Gope, P., Sikdar, B.: An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Trans. Veh. Technol. 69(11), 13621–13630 (2020)

    Article  Google Scholar 

  12. Tian, C., Jiang, Q., Li, T., Zhang, J., Xi, N., Ma, J.: Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment. Comput. Netw. 218, 1–13 (2022)

    Article  Google Scholar 

  13. Kumar, V., Ahmad, M., Kumari, A., Kumari, S., Khan, M.: SEBAP: a secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing. Int. J. Commun. Syst. 34(2), 1–21 (2021)

    Article  Google Scholar 

  14. Bera, B., Das, A., Balzano, W., Medaglia, C.: On the design of biometric-based user authentication protocol in smart city environment. Pattern Recogn. Lett. 138, 439–446 (2020)

    Article  Google Scholar 

  15. Bian, W., Gope, P., Cheng, Y., Li, Q.: Bio-AKA: an efficient fingerprint based two factor user authentication and key agreement scheme. Futur. Gener. Comput. Syst. 109, 45–55 (2020)

    Article  Google Scholar 

  16. Zhang, H., Bian, W., Jie, B., Xu, D., Zhao, J.: A complete user authentication and key agreement scheme using cancelable biometrics and PUF in multi-server environment. IEEE Trans. Inf. Forensics Secur. 16, 5413–5428 (2021)

    Article  Google Scholar 

  17. Alladi, T., Chamola, V., Kumar, N.: PARTH: a two-stage lightweight mutual authentication protocol for UAV surveillance networks. Comput. Commun. 160, 81–90 (2020)

    Article  Google Scholar 

  18. Kim, B., Yoon, S., Kang, Y., Choi, D.: PUF based IoT device authentication scheme. In: 2019 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1460–1462. IEEE (2019)

    Google Scholar 

  19. Blakley, G.: Safeguarding cryptographic keys. In: Managing Requirements Knowledge, International Workshop, pp. 313–313. IEEE Computer Society (1979)

    Google Scholar 

  20. Gaba, G., Hedabou, M., Kumar, P., Braeken, A., Liyanage, M., Alazab, M.: Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare. Sustain. Urban Areas 80, 1–12 (2022)

    Google Scholar 

  21. Jin, Z., Hwang, Y.J., Lai, Y., Kim, S., Teoh, A.: Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. EEE Trans. Inf. Forensics Secur. 13(2), 393–407 (2017)

    Article  Google Scholar 

  22. Bansal, G., Sikdar, B.: S-MAPS: scalable mutual authentication protocol for dynamic UAV swarms. IEEE Trans. Veh. Technol. 70(11), 12088–12100 (2021)

    Article  Google Scholar 

  23. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  24. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 8(1), 18–36 (1990)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China Project (No. 61972001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Z. et al. (2024). TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14493. Springer, Singapore. https://doi.org/10.1007/978-981-97-0862-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0862-8_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0861-1

  • Online ISBN: 978-981-97-0862-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics