Efficient authentication of drones to mmwave wireless mesh networks in post-disaster scenarios

Show simple item record

dc.contributor.author Abdel-Malek, Mai A.
dc.contributor.author Saputro, Nico
dc.contributor.author Akkay, Kemal
dc.contributor.author Ibrahim, Ahmed S.
dc.date.accessioned 2023-04-04T08:13:32Z
dc.date.available 2023-04-04T08:13:32Z
dc.date.issued 2020
dc.identifier.isbn 978-1-7281-8298-8
dc.identifier.other maklhsc756
dc.identifier.uri http://hdl.handle.net/123456789/14786
dc.description Makalah dipresentasikan pada The 2020 IEEE Global Communications Conference (GLOBECOM). Desember 2020. p. 1-6. en_US
dc.description.abstract Unmanned Aerial Vehicles (UAVs), or drones, are increasingly being utilized for public safety circumstances including post-disaster recovery of destroyed communication infrastructure. For instance, drones are temporarily positioned within an affected area to create a wireless mesh network among public safety personnel. To serve the need for high-rate video-based damage assessment, drone-assisted communication can utilize high-bandwidth millimeter wave (mmWave) technologies such as IEEE 802.11ad. However, short-range mmWave communication makes it hard for optimally-positioned drones to be authenticated with a centralized network control center. Therefore and assuming that there are potential imposters, we propose two lightweight and fast authentication mechanisms that take into account the physical limitations of mmWave communication. First, we propose a drone-to-drone authentication mechanism, which is based on proxy signatures from a control center. Accordingly, any newly joining drone can authenticate itself to an exist one rather than attempting to authenticate to the outof- reach control center. Second, we propose a drone-to-ground authentication mechanism, to enable each drone to authenticate itself to its associated ground users. Such authentication approach is based on challenge-response broadcast type, and it is still utilizing fast proxy signature approach. The evaluation of the proposed authentication mechanisms, conducted using NS-3 implementation of IEEE 802.11ad protocol, show their efficiency and practicality. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject AUTHENTICATION en_US
dc.subject DRONES en_US
dc.subject MILLIMETER WAVE en_US
dc.subject MESH NETWORK en_US
dc.subject PROXY-SIGNATURE en_US
dc.title Efficient authentication of drones to mmwave wireless mesh networks in post-disaster scenarios en_US
dc.type Conference Papers en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UNPAR-IR


Advanced Search

Browse

My Account