Abstract

In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.

Highlights

  • With the development of battery power, sensing systems, artificial intelligence and other technologies, small commercial unmanned aerial vehicles (UAVs) combining these technologies have, in recent years, become a very popular product

  • All UAVs manufactured, all mobile devices carried by players, and all ground control stations must be registered to the trusted authority center through a secure channel

  • The player transfers the purchase or rental certificate of the UAV, and the flight path agreed by the ground control station to the UAV

Read more

Summary

Introduction

With the development of battery power, sensing systems, artificial intelligence and other technologies, small commercial unmanned aerial vehicles (UAVs) combining these technologies have, in recent years, become a very popular product. Wesson et al [13] further analyzed and evaluated the cryptographic strategies of ADS-B based on their effectiveness and practicality in the cost-averse, technologically-complex, and interoperability-focused aviation community The purpose of these works was to find a suitable mechanism to ensure the security of the UAVs system for sensitive control areas. It is a fact that to prevent all intrusions from being attacked by hackers, the fundamental solution is to propose an effective and comprehensive security protocol Such a secure mechanism should comprehensively detect and provide information and identity authentication to achieve the purposes of availability, privacy, and non-repudiation and to defend against known attacks for the UAV’s environment. The authors considered that location, identity, and flying routes of each legitimate UAV are sensitive information in the IoD network They proposed a secure authentication and privacy protection for an efficient MEC-assisted (mobile edge computing) framework.

Elliptic Curve Cryptography and Diffie–Hellman Key Exchange
Security Requirements
The Proposed Scheme
System
Notations q
Manufacturer
2: The trusted :authority center selects abetween randomthe number
1: The player identity ID
Ground
Player and Ground Control Station Authentication and Communication Phase
2: Thethe manufacturer selects a randomThe number
Ground Control Station and UAV Authentication and Communication Phase
Mutual Authentication
Integrity and Confidentiality
Identity Anonymity and Privacy
Availability and Prevention of DoS Attack
Prevention of Spoofing Attack
Non-Repudiation
Computation Cost
Communication Cost
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.