Lightweight Secure Communication Supporting Batch Authentication for UAV Swarm

被引:0
作者
Han, Pengbin [1 ]
Sui, Aina [1 ]
Wu, Jiang [2 ]
机构
[1] Commun Univ China, Sch Comp & Cyber Sci, Beijing 100024, Peoples R China
[2] Beihang Univ, Sch Automat Sci & Elect Engn, Beijing 100191, Peoples R China
关键词
UAV swarm; ECC; secure communication; identity authentication; BLOCKCHAIN; PROTOCOL; SCHEME;
D O I
10.3390/drones9020139
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
In recent years, with the widespread application of UAV swarm, the security problems faced have been gradually discovered, such as the lack of reliable identity authentication, which makes UAVs vulnerable to invasion. To solve these security problems, a lightweight secure communication scheme supporting batch authentication for UAV swarm is proposed. Firstly, a layered secure communication model for UAV swarm is designed. Then, a secure transmission protocol is implemented by using elliptic curves under this model, which not only reduces the number of encryptions but also ensures the randomness and one-time use of the session key. Moreover, a UAV identity authentication scheme supporting batch signature verification is proposed, which improves the efficiency of identity authentication. The experiments show that, when the number of UAVs is 60, the computation cost of the proposed scheme is 0.071 s, and the communication cost is 0.203 s, fully demonstrating the efficiency and practicability of the scheme. Through comprehensive security analysis, the capability of the proposed scheme to resist various attacks is demonstrated.
引用
收藏
页数:18
相关论文
共 36 条
[1]  
Alladi Tejasvi, 2020, Vehicular Communications, V23, DOI 10.1016/j.vehcom.2020.100249
[2]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[3]   Blockchain-based batch authentication protocol for Internet of Vehicles [J].
Bagga, Palak ;
Sutrala, Anil Kumar ;
Das, Ashok Kumar ;
Vijayakumar, Pandi .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 113
[4]   Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach [J].
Bansal, Gaurang ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04) :3598-3610
[5]   ECC-Based Authenticated Key Agreement Protocol for Industrial Control System [J].
Chen, Yanru ;
Yin, Fengming ;
Hu, Shunfang ;
Sun, Limin ;
Li, Yang ;
Xing, Bin ;
Chen, Liangyin ;
Guo, Bing .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) :4688-4697
[6]   A Distributed Collaborative Allocation Method of Reconnaissance and Strike Tasks for Heterogeneous UAVs [J].
Deng, Hanqiang ;
Huang, Jian ;
Liu, Quan ;
Zhao, Tuo ;
Zhou, Cong ;
Gao, Jialong .
DRONES, 2023, 7 (02)
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]   P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks [J].
Feng, Xia ;
Shi, Qichen ;
Xie, Qingqing ;
Wang, Liangmin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :3888-3899
[9]   An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks [J].
Fotohi, Reza ;
Nazemi, Eslam ;
Aliee, Fereidoon Shams .
VEHICULAR COMMUNICATIONS, 2020, 26
[10]   A provably secure ECC-based access and handover authentication protocol for space information networks [J].
Guo, Junyan ;
Du, Ye ;
Zhang, Yahang ;
Li, Meihong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193