PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication

被引:3
作者
Chen, Liquan [1 ,2 ]
Zhu, Yaqing [1 ]
Liu, Suhui [1 ]
Yu, Hongtao [1 ]
Zhang, Bing [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
基金
中国国家自然科学基金;
关键词
PUF; Shamir; Blockchain; UAV; Authentication; MUTUAL AUTHENTICATION; SURVEILLANCE; NETWORKS; SECURITY; INTERNET; SCHEME;
D O I
10.1016/j.comcom.2024.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolving UAV swarm flight environment exacerbates the difficulty of secure message delivery within the swarm. Physical Unclonable Functions (PUFs) have the potential to provide lightweight physical identities to UAV nodes. Nevertheless, the explicit storage of a private key within each UAV device invariably results in privacy leakage arising from physical hijacking. Therefore, to accomplish unified management and decentralized storage of identity informations for UAVs, as well as to simultaneously realize the dynamic updating of private key, we propose a PUF-based Dynamic Secret -key strategy with Hierarchical Blockchain (PDSHB) for UAV swarm authentication. Specifically, the master blockchain ensures that all UAVs' registration information is tamper -proof, while the dynamic sub-blockchain synchronizes the UAV information within the swarm. Meanwhile, we have developed a more reliable and efficient PUF-based dynamic secret -key strategy that eliminates the need to store any secret information within UAVs, effectively mitigating the risk of key leakage resulting from physical attacks. Protocol security is demonstrated through formal security proofs, informal security analysis, and AVISPA security checking. Performance experiments based on Raspberry Pi 4B and FPGA-based F450 UAVs also show that the proposed protocol can deal with various security threats of dynamic swarms of UAVs and reduce computational and communication overheads during authentication.
引用
收藏
页码:31 / 43
页数:13
相关论文
共 48 条
  • [1] Applications, Deployments, and Integration of Internet of Drones (IoD): A Review
    Abualigah, Laith
    Diabat, Ali
    Sumari, Putra
    Gandomi, Amir H.
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (22) : 25532 - 25546
  • [2] A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions
    Alkatheiri, Mohammed Saeed
    Saleem, Sajid
    Alqarni, Mohammed Ali
    Aseeri, Ahmad O.
    Chauhdary, Sajjad Hussain
    Zhuang, Yu
    [J]. ELECTRONICS, 2022, 11 (18)
  • [3] Alladi Tejasvi, 2020, Vehicular Communications, V23, DOI 10.1016/j.vehcom.2020.100249
  • [4] SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
    Alladi, Tejasvi
    Bansal, Gaurang
    Chamola, Vinay
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15068 - 15077
  • [5] PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks
    Alladi, Tejasvi
    Chamola, Vinay
    Naren
    Kumar, Neeraj
    [J]. COMPUTER COMMUNICATIONS, 2020, 160 (160) : 81 - 90
  • [6] UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones
    Allouch, Azza
    Cheikhrouhou, Omar
    Koubaa, Anis
    Toumi, Khalifa
    Khalgui, Mohamed
    Nguyen Gia, Tuan
    [J]. SENSORS, 2021, 21 (09)
  • [7] AVISPA, 2017, Automated validation of internet security protocols and applications Online
  • [8] Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Altaf, Izwa
    Mahmood, Khalid
    Kumari, Saru
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55 (55)
  • [9] Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
    Bera, Basudeb
    Das, Ashok Kumar
    Sutrala, Anil Kumar
    [J]. COMPUTER COMMUNICATIONS, 2021, 166 : 91 - 109
  • [10] PUF Based Authentication Protocol for IoT
    Braeken, An
    [J]. SYMMETRY-BASEL, 2018, 10 (08):