A Security Framework for a Drone Delivery Service

被引:29
作者
Seo, Seung-Hyun [1 ]
Won, Jongho [2 ]
Bertino, Elisa [2 ]
Kang, Yousung [3 ]
Choi, Dooho [3 ]
机构
[1] Korea Univ, Dept Math, Sejong Campus, Seoul, South Korea
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] ETRI, Informat Secur Res Div, Daejeon, South Korea
来源
DRONET'16: PROCEEDINGS OF THE 2ND WORKSHOP ON MICRO AERIAL VEHICLE NETWORKS, SYSTEMS, AND APPLICATIONS FOR CIVILIAN USE | 2016年
关键词
White-Box Cryptography; Drone Delivery Service; Security Framework;
D O I
10.1145/2935620.2935629
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Delivery drones are unmanned aerial vehicles (UAV) utilized to transport packages, food, medicine, or other goods. With high demand for a prompt and efficient delivery, a drone delivery system can be an effective solution for timely deliveries and especially for emergency management. However, current delivery drone systems lack crucial security functions. Drones may have to operate in unsupervised hostile areas, and therefore be vulnerable to physical capture in addition to conventional cyber attacks. A captured drone can be analyzed by a white-box attack model in which the attacker has full control over the execution environment of crypto-graphic modules in static and dynamic methods including all side-channel information. In this paper, we propose and evaluate a security framework which utilizes white-box cryptography in order to protect critical data and cryptographic keys in delivery drones from white-box attacks. The experimental results show that the proposed framework is cost effective in terms of resource usage and thus is suitable even for resource-limited UAV.
引用
收藏
页码:29 / 34
页数:6
相关论文
共 10 条
[1]  
[Anonymous], P 9 WORKSH SEL AR CR
[2]  
[Anonymous], 2013, LNCS, DOI DOI 10.1007/978-3-662-43414-7_14
[3]  
Bell Lee, 2015, THE INQUIRER 0401
[4]  
Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
[5]  
Bringer J., 2006, IACR Cryptology ePrint Archive, V2006, P468
[6]  
Cho J., 2015, 2015800 IACR EPRINT
[7]  
De Mulder Y, 2010, LECT NOTES COMPUT SC, V6498, P292, DOI 10.1007/978-3-642-17401-8_21
[8]  
De Mulder Yoni., 2013, Selected Areas in Cryptography, P34, DOI DOI 10.1007/978-3-642-35999-63
[9]  
Kamkar Samy, 2013, SKY JACK
[10]  
Lee S., ETRI J, V37