Abstract

In parallel with the advances of aerial networks, the use of drones is quickly included in daily activities. According to the characteristics of the operations to be carried out using the drones, the need for simultaneous use of one or more drones has arisen. The use of a drone swarm is preferred rather than the use of a single drone to complete activities such as secure crowd monitoring systems, cargo delivery. Due to the limited airtime of the drones, new members may be included in the swarm, or there may be a unification of two or more drone swarms when needed. Authentication of the new drone that will take its place in the drone swarm and the rapid mutual-verification of two different swarms of drones are some of the security issues in the swarm structures. In this study, group authentication-based solutions have been put forward to solve the identified security issues. The proposed methods and 5G new radio (NR) authentication methods were compared in terms of time and a significant time difference was obtained. According to the 5G NR standard, it takes 22 ms for a user equipment (UE) to be verified by unified data management (UDM), while in the proposed method, this time varies according to the threshold value of the polynomial used and it is substantially lower than 22 ms for most threshold values.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.