TY - GEN
T1 - UAV-VANET authentication for real-time highway surveillance
AU - Piramuthu, Otto B.
AU - Caesar, Matthew
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/4/25
Y1 - 2022/4/25
N2 - Unmanned aerial vehicles (UAVs) or drones have the potential to supplant helicopters in real-time highway surveillance applications due to cost, form factor, and other considerations. The wireless medium used for communication has the potential to expose a fleet of drones en route to surveillance to link failures and attacks on passed messages. Given the sparse topology, messages among UAVs, vehicles, and trusted authority could be transmitted through collaboration among UAVs and vehicles. Since vehicles and drones in a highway environment are mobile, related ad hoc network is continuously updated to account for reachability of transmitted signals. It is also necessary to authenticate the drones and vehicles to ensure that the transmitted messages are uncorrupted and trusted. To accommodate processing power and mobility constraints, we develop lightweight authentication protocols that facilitate secure message transfer. We also evaluate the security properties of these protocols.
AB - Unmanned aerial vehicles (UAVs) or drones have the potential to supplant helicopters in real-time highway surveillance applications due to cost, form factor, and other considerations. The wireless medium used for communication has the potential to expose a fleet of drones en route to surveillance to link failures and attacks on passed messages. Given the sparse topology, messages among UAVs, vehicles, and trusted authority could be transmitted through collaboration among UAVs and vehicles. Since vehicles and drones in a highway environment are mobile, related ad hoc network is continuously updated to account for reachability of transmitted signals. It is also necessary to authenticate the drones and vehicles to ensure that the transmitted messages are uncorrupted and trusted. To accommodate processing power and mobility constraints, we develop lightweight authentication protocols that facilitate secure message transfer. We also evaluate the security properties of these protocols.
KW - VANET
KW - authentication
KW - unmanned aerial vehicle (UAV)
UR - http://www.scopus.com/inward/record.url?scp=85130387653&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85130387653&partnerID=8YFLogxK
U2 - 10.1145/3477314.3507021
DO - 10.1145/3477314.3507021
M3 - Conference contribution
AN - SCOPUS:85130387653
T3 - Proceedings of the ACM Symposium on Applied Computing
SP - 1925
EP - 1931
BT - Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022
PB - Association for Computing Machinery
T2 - 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022
Y2 - 25 April 2022 through 29 April 2022
ER -