作者: Giovanni Pau , Ilsun You , Jiyoon Kim , Yongho Ko , Philip Virgil Astillo
DOI: 10.3390/S21062057
关键词:
摘要: Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development implementation of these devices have become vital terms usability reachability. Unfortunately, they widespread their demand grows, are becoming more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, spoofing. In order cope with attacks threats, proper design robust protocols is indispensable. Although pieces research been carried out this regard, there still gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, provision non-repudiation. Especially military scenario, it essential solve gaps. paper, we studied the prerequisites UAV communication protocol, specifically setting. More importantly, protocol (with two sub-protocols), that serves securing between UAVs, Ground Control Station, proposed. This apart from common requirements, achieves secrecy non-repudiation, which communication. proposed formally thoroughly verified by using BAN-logic (Burrow-Abadi-Needham logic) Scyther tool, followed performance evaluation on real UAV. From evaluation, indicated superior compared other related while meeting confidentiality, integrity, mutual authentication, backward response DoS (Denial Service) man-in-the-middle protection, D2D (Drone-to-Drone) security.