Secure, Robust, and Energy-Efficient Authenticated Data Sharing in UAV-Assisted 6G Networks

Atefeh Mohseni Ejiyeh
2024-02-18
Abstract:This paper confronts the pressing challenges of sixth-generation (6G) wireless communication networks by harnessing the unique capabilities of Unmanned Aerial Vehicles (UAVs). With the ambitious promises of 6G, including ultra-reliable 1 Tbps data delivery and ultra-low latency, the demand for innovative solutions becomes imperative. Traditional terrestrial base stations, though effective, exhibit limitations in scenarios requiring ubiquitous connectivity, prompting the integration of UAVs. In response to these challenges, we introduce a comprehensive solution. This involves UAVs collaboratively downloading desired content from service providers, and subsequently establishing secure connections with users for efficient content exchange. Accordingly, we introduce two new protocols: a collaborative group data downloading scheme among UAVs called SeGDS, and SeDDS for secure direct data sharing through out-of-band autonomous Device-to-Device (D2D) communication. Leveraging certificateless signcryption and certificateless multi-receiver encryption, these protocols offer lightweight, certificate-free solutions with features such as user revocation, non-repudiation, and mutual authentication. Prioritizing high availability, the proposed protocols effectively detect Denial of Service (DoS) and free riding attacks. A thorough evaluation underscores the superiority of the proposed protocols in both security and efficiency over existing models; SeDDS reduces overall computation by 3x, imposing a lighter communication load on UAVs, while SeGDS meets swarm UAV security requirements, reducing communication costs by 4x with low computation cost.
Cryptography and Security
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is to utilize unmanned aerial vehicles (UAVs) to assist in achieving secure, robust and energy - efficient data sharing in 6G networks. Specifically, the paper proposes innovative solutions to the following two core challenges: 1. **Establishing a secure communication channel**: With the requirements of 6G networks for data transmission rates (such as ultra - reliable 1 Tbps data delivery) and low latency (less than 100ms), traditional terrestrial base stations are difficult to meet the comprehensive connection requirements in some scenarios, especially in disaster response or communication in remote areas. Therefore, it is necessary to introduce UAVs to fill the coverage gap and ensure the secure transmission of data between UAVs and users. 2. **Efficient content distribution**: In order to improve the efficiency of data distribution and reduce redundancy, the paper proposes a new protocol that enables UAVs to cooperatively download data packets and quickly deliver the content to end - users through direct device - to - device (D2D) communication. In addition, it is also necessary to ensure that this distribution method is lightweight to adapt to the resource - constrained UAV platform. To solve the above problems, the paper introduces two new protocols: - **SeGDS (Secure Group Data Sharing Scheme)**: This is a protocol for efficient content sharing among UAV groups. It minimizes redundancy and speeds up delivery by cooperatively downloading data packets. - **SeDDS (Secure Direct Data Sharing Scheme)**: This is a protocol that ensures direct and non - repudiable data sharing between UAVs and users. It eliminates intermediate hops and achieves tamper - proof transmission. These protocols utilize certificateless signcryption and certificateless multi - receiver encryption to provide lightweight, certificateless solutions with functions such as user revocation, non - repudiation and mutual authentication. At the same time, the protocol design also takes into account high availability and can effectively detect denial - of - service (DoS) attacks and free - riding attacks. Through detailed performance evaluation, the paper shows that the proposed protocols are superior to existing models in terms of security and efficiency. For example, SeDDS reduces the overall computational amount by 3 times and the communication load of UAVs; while SeGDS meets the security requirements of UAV groups, reduces the communication cost by 4 times, and maintains a low computational cost.