PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication

被引:3
作者
Chen, Liquan [1 ,2 ]
Zhu, Yaqing [1 ]
Liu, Suhui [1 ]
Yu, Hongtao [1 ]
Zhang, Bing [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
基金
中国国家自然科学基金;
关键词
PUF; Shamir; Blockchain; UAV; Authentication; MUTUAL AUTHENTICATION; SURVEILLANCE; NETWORKS; SECURITY; INTERNET; SCHEME;
D O I
10.1016/j.comcom.2024.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolving UAV swarm flight environment exacerbates the difficulty of secure message delivery within the swarm. Physical Unclonable Functions (PUFs) have the potential to provide lightweight physical identities to UAV nodes. Nevertheless, the explicit storage of a private key within each UAV device invariably results in privacy leakage arising from physical hijacking. Therefore, to accomplish unified management and decentralized storage of identity informations for UAVs, as well as to simultaneously realize the dynamic updating of private key, we propose a PUF-based Dynamic Secret -key strategy with Hierarchical Blockchain (PDSHB) for UAV swarm authentication. Specifically, the master blockchain ensures that all UAVs' registration information is tamper -proof, while the dynamic sub-blockchain synchronizes the UAV information within the swarm. Meanwhile, we have developed a more reliable and efficient PUF-based dynamic secret -key strategy that eliminates the need to store any secret information within UAVs, effectively mitigating the risk of key leakage resulting from physical attacks. Protocol security is demonstrated through formal security proofs, informal security analysis, and AVISPA security checking. Performance experiments based on Raspberry Pi 4B and FPGA-based F450 UAVs also show that the proposed protocol can deal with various security threats of dynamic swarms of UAVs and reduce computational and communication overheads during authentication.
引用
收藏
页码:31 / 43
页数:13
相关论文
共 48 条
[11]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[12]   Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database [J].
Chatterjee, Urbi ;
Govindan, Vidya ;
Sadhukhan, Rajat ;
Mukhopadhyay, Debdeep ;
Chakraborty, Rajat Subhra ;
Mahata, Debashis ;
Prabhu, Mukesh M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) :424-437
[13]   ToAM: a task-oriented authentication model for UAVs based on blockchain [J].
Chen, Aiguo ;
Peng, Kun ;
Sha, Zexin ;
Zhou, Xincen ;
Yang, Zhen ;
Lu, Guoming .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[14]   An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems [J].
Chen, Liquan ;
Qian, Sijie ;
Lim, Ming ;
Wang, Shihui .
CHINA COMMUNICATIONS, 2018, 15 (05) :61-76
[15]   Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir's Secret Sharing [J].
Chen, Shuai ;
Li, Bing ;
Chen, Ziheng ;
Zhang, Yan ;
Wang, Caicai ;
Tao, Cheng .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) :14408-14425
[16]  
Corniaux Christian L. F., 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), P46, DOI 10.1109/InfoSEEE.2014.6948065
[17]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[18]  
Fernandez-Carames O., 2018, PROC MULTIDISCIPL DI, P26
[19]   Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain [J].
Garcia-Magarino, Ivan ;
Lacuest, Raquel ;
Rajarajan, Muttukrishnan ;
Lloret, Jaime .
AD HOC NETWORKS, 2019, 86 :72-82
[20]   An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :13621-13630