PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks

被引:2
作者
Nair, Aiswarya S. [1 ,2 ]
Thampi, Sabu M. [3 ]
机构
[1] Indian Inst Informat Technol & Management Kerala, Trivandrum, Kerala, India
[2] Cochin Univ Sci & Techol CUSAT, Cochin, Kerala, India
[3] Kerala Univ Digital Sci Innovat & Technol KUDSIT, Technoc Campus, Trivandrum, Kerala, India
来源
UBIQUITOUS SECURITY | 2022年 / 1557卷
关键词
Drone authentication; PUF; Location validation; Impersonation; PUFloc; FPGA; KEY EXCHANGE PROTOCOL; LIGHTWEIGHT AUTHENTICATION; AGREEMENT SCHEME; PROVABLY SECURE; DESIGN; INTERNET;
D O I
10.1007/978-981-19-0468-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security hazards in the digital sky of drones urges for lightweight and secure defense mechanisms against several cyber-attacks on drone networks. The main issues in a surveillance drone network are identification of valid drones, maintaining boundaries and information security along with physical security. To address these issues we are proposing a lightweight and secure drone-to-ground station and drone-to-drone mutual authentication protocol, PUFloc, using Physical unclonable functions (PUFs) and drone location data. PUFloc ensures attack resiliency and fail safe operation and uses only hash functions, XOR operations, PUF and random number generators. This is the first work that addresses physical security along with location validation of drones for mutually authenticating the drone with the ground station with minimum resource overheads and maximum security. Formal security analysis is done using random oracle model and ProVerif tool and informal security analysis also proves the resistance of our protocol against several possible attacks. FPGA implementation of the major cryptographic operations to estimate the power consumption and resource utilization show that the operations are lightweight to be implemented on drones. The analysis of performance and security and their comparison with existing works showcase the merit of PUFloc over other protocols.
引用
收藏
页码:66 / 89
页数:24
相关论文
共 50 条
  • [31] PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking
    Resende, Amanda C. Davi
    Mochetti, Karina
    Aranha, Diego F.
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, LIGHTSEC 2015, 2016, 9542 : 77 - 96
  • [32] A location-aware physical unclonable function and Chebyshev map-based mutual authentication mechanism for internet of surveillance drones
    Nair, Aiswarya S.
    Thampi, Sabu M.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (19)
  • [33] Bilinear Pairing and PUF Based Lightweight Authentication Protocol for IoD Environment
    Pu, Cong
    Wall, Andrew
    Choo, Kim-Kwang Raymond
    2022 IEEE 19TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2022), 2022, : 115 - 121
  • [34] PUF-based Lightweight Authentication for Binarized Neural Networks
    Rajendran, Gokulnath
    Deb, Suman
    Chattopadhyay, Anupam
    2024 IEEE THE 20TH ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS 2024, 2024, : 447 - 451
  • [35] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)
  • [36] WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks
    Kwon, Deok Kyu
    Yu, Sung Jin
    Lee, Joon Young
    Son, Seung Hwan
    Park, Young Ho
    SENSORS, 2021, 21 (03) : 1 - 23
  • [37] Weaknesses of fingerprint-based mutual authentication protocol
    Picazo-Sanchez, Pablo
    Ortiz-Martin, Lara
    Peris-Lopez, Pedro
    Bagheri, Nasour
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (12) : 2124 - 2134
  • [38] An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT
    Wu, Tsu-Yang
    Wu, Haozhi
    Kumari, Saru
    Chen, Chien-Ming
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [39] A practical and flexible PUF-based end-to-end anonymous authentication protocol for IoT
    Li, Sensen
    Huang, Yicai
    Yu, Bin
    COMPUTER NETWORKS, 2024, 247
  • [40] Efficient User Based Authentication Protocol for Location Based Services Discovery Over Road Networks
    Memon, Imran
    Arain, Qasim Ali
    Memon, Hina
    Mangi, Farman Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (04) : 3713 - 3732