PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks

被引:2
作者
Nair, Aiswarya S. [1 ,2 ]
Thampi, Sabu M. [3 ]
机构
[1] Indian Inst Informat Technol & Management Kerala, Trivandrum, Kerala, India
[2] Cochin Univ Sci & Techol CUSAT, Cochin, Kerala, India
[3] Kerala Univ Digital Sci Innovat & Technol KUDSIT, Technoc Campus, Trivandrum, Kerala, India
来源
UBIQUITOUS SECURITY | 2022年 / 1557卷
关键词
Drone authentication; PUF; Location validation; Impersonation; PUFloc; FPGA; KEY EXCHANGE PROTOCOL; LIGHTWEIGHT AUTHENTICATION; AGREEMENT SCHEME; PROVABLY SECURE; DESIGN; INTERNET;
D O I
10.1007/978-981-19-0468-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security hazards in the digital sky of drones urges for lightweight and secure defense mechanisms against several cyber-attacks on drone networks. The main issues in a surveillance drone network are identification of valid drones, maintaining boundaries and information security along with physical security. To address these issues we are proposing a lightweight and secure drone-to-ground station and drone-to-drone mutual authentication protocol, PUFloc, using Physical unclonable functions (PUFs) and drone location data. PUFloc ensures attack resiliency and fail safe operation and uses only hash functions, XOR operations, PUF and random number generators. This is the first work that addresses physical security along with location validation of drones for mutually authenticating the drone with the ground station with minimum resource overheads and maximum security. Formal security analysis is done using random oracle model and ProVerif tool and informal security analysis also proves the resistance of our protocol against several possible attacks. FPGA implementation of the major cryptographic operations to estimate the power consumption and resource utilization show that the operations are lightweight to be implemented on drones. The analysis of performance and security and their comparison with existing works showcase the merit of PUFloc over other protocols.
引用
收藏
页码:66 / 89
页数:24
相关论文
共 50 条
  • [41] A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database
    Nimmy, K.
    Sankaran, Sriram
    Achuthan, Krishnashree
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (5) : 6227 - 6242
  • [42] A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning
    Liang, Wei
    Xie, Songyou
    Zhang, Dafang
    Li, Xiong
    Li, Kuan-ching
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (02)
  • [43] PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication
    Chen, Liquan
    Zhu, Yaqing
    Liu, Suhui
    Yu, Hongtao
    Zhang, Bing
    COMPUTER COMMUNICATIONS, 2024, 218 : 31 - 43
  • [44] Blockchain-based privacy-preserving authentication protocol for UAV networks
    Akram, Muhammad Arslan
    Ahmad, Hira
    Mian, Adnan Noor
    Jurcut, Anca Delia
    Kumari, Saru
    COMPUTER NETWORKS, 2023, 224
  • [45] Concealing KETJE: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
    Geltink, Gerben
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, 2017, 10098 : 128 - 148
  • [46] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)
  • [47] PUF-HB: A tamper-resilient HB based authentication protocol
    Hammouri, Ghaith
    Sunar, Berk
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 346 - 365
  • [48] PUF-RLA: A PUF-based Reliable and Lightweight Authentication Protocol employing Binary String Shuffling
    Qureshi, Mahmood Azhar
    Munir, Arslan
    2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 576 - 584
  • [49] CSECMAS: An Efficient and Secure Certificate Signing Based Elliptic Curve Multiple Authentication Scheme for Drone Communication Networks
    Li, Lin
    Lian, Xiaofeng
    Wang, Yulong
    Tan, Li
    APPLIED SCIENCES-BASEL, 2022, 12 (18):
  • [50] PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication
    Mahmood, Khalid
    Shamshad, Salman
    Rana, Minahil
    Shafiq, Akasha
    Ahmad, Shafiq
    Akram, Muhammad Arslan
    Amin, Ruhul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61