Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone.

作者: Giovanni Pau , Ilsun You , Jiyoon Kim , Yongho Ko , Philip Virgil Astillo

DOI: 10.3390/S21062057

关键词:

摘要: Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development implementation of these devices have become vital terms usability reachability. Unfortunately, they widespread their demand grows, are becoming more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, spoofing. In order cope with attacks threats, proper design robust protocols is indispensable. Although pieces research been carried out this regard, there still gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, provision non-repudiation. Especially military scenario, it essential solve gaps. paper, we studied the prerequisites UAV communication protocol, specifically setting. More importantly, protocol (with two sub-protocols), that serves securing between UAVs, Ground Control Station, proposed. This apart from common requirements, achieves secrecy non-repudiation, which communication. proposed formally thoroughly verified by using BAN-logic (Burrow-Abadi-Needham logic) Scyther tool, followed performance evaluation on real UAV. From evaluation, indicated superior compared other related while meeting confidentiality, integrity, mutual authentication, backward response DoS (Denial Service) man-in-the-middle protection, D2D (Drone-to-Drone) security.

参考文章(18)
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
Vlastimil Kriz, Petr Gabrlik, UranusLink - Communication Protocol for UAV with Small Overhead and Encryption Ability IFAC-PapersOnLine. ,vol. 48, pp. 474- 479 ,(2015) , 10.1016/J.IFACOL.2015.07.080
Daojing He, Sammy Chan, Mohsen Guizani, Communication Security of Unmanned Aerial Vehicles IEEE Wireless Communications. ,vol. 24, pp. 134- 139 ,(2017) , 10.1109/MWC.2016.1600073WC
Syed Ahsan Raza Naqvi, Syed Ali Hassan, Haris Pervaiz, Qiang Ni, Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks IEEE Communications Magazine. ,vol. 56, pp. 36- 42 ,(2018) , 10.1109/MCOM.2017.1700451
Vishal Sharma, Gaurav Choudhary, Yongho Ko, Ilsun You, Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT) IEEE Access. ,vol. 6, pp. 43368- 43383 ,(2018) , 10.1109/ACCESS.2018.2856368
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues, Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment IEEE Internet of Things Journal. ,vol. 6, pp. 3572- 3584 ,(2019) , 10.1109/JIOT.2018.2888821
S. John Livingston, Pokuri Hari Chandan, Raj Sandeep Simeon, Bommi Vikas, D-ARCH: A Detailed Analysis of Drone Challenges Policy Enforcements and Security Solutions Journal of Computational and Theoretical Nanoscience. ,vol. 15, pp. 2842- 2847 ,(2018) , 10.1166/JCTN.2018.7549
Sieun Kim, Taek-Young Youn, Daeseon Choi, Ki-Woong Park, UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization Wireless Communications and Mobile Computing. ,vol. 2019, pp. 1- 11 ,(2019) , 10.1155/2019/8913910