Lightweight Authentication Protocol for Unmanned Aerial Vehicles Using Physical Unclonable Function and Chaotic System

被引:46
作者
Pu, Cong [1 ]
Li, Yucheng [1 ]
机构
[1] Marshall Univ, Dept Comp Sci & Elect Engn, Huntington, WV 25755 USA
来源
2020 26TH IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN) | 2020年
关键词
Unmanned Aerial Vehicles; Authentication Protocol; Physical Unclonable Function; Chaotic System; INTERNET; SCHEME;
D O I
10.1109/lanman49260.2020.9153239
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the continuous miniaturization of electronic devices and the recent advancement in wireless communications, unmanned aerial vehicles (UAVs) will find many new uses in people's production and life, bringing great convenience to the public. Meanwhile, the cybersecurity of UAVs is gaining significant attention due to both financial and strategic information and value involved in aerial applications, and UAV and sensitive data collected by embedded sensors are subject to new security challenges and privacy issues. Traditional cryptographic techniques can be deployed to provide fundamental security services, however, they have been shown to be inefficient because of intrinsic resource constraints of UAVs and the open nature of wireless communication. For the sake of providing secure authentication between communication parties and further ensuring data security and privacy, this paper proposes a lightweight mutual authentication protocol, also referred to as PCAP, for secure communications between UAVs and ground station. The basic idea of the PCAP is that UAV and ground station use the challenge-response pair of physical unclonable function as the initial condition of chaotic system to randomly shuffle the message which piggybacks a seed to generate a secret session key. We conduct simulation experiments using OMNeT++ to validate the effectiveness of the PCAP. The simulation results show that the PCAP can achieve better performance in terms of computation cost, communication overhead, and energy consumption of communication compared to prior cryptographic technique, indicating a viable approach for securing communications between UAVs and ground station.
引用
收藏
页数:6
相关论文
共 23 条
[1]  
Aggarwal S, 2019, IEEE ICC
[2]  
Altawy R, 2017, ACM TRANS CYBER-PHYS, V1, DOI 10.1145/3001836
[3]   Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function [J].
Bansal, Gaurang ;
Naren, Naren ;
Chamola, Vinay ;
Sikdar, Biplab ;
Kumar, Neeraj ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) :7234-7246
[4]  
Colombo AW, 2017, IEEE IND ELECTRON M, V11, P6, DOI 10.1109/MIE.2017.2648857
[5]   An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit [J].
Feng, Zhiwei ;
Guan, Nan ;
Lv, Mingsong ;
Liu, Weichen ;
Deng, Qingxu ;
Liu, Xue ;
Yi, Wang .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 17 (06)
[6]   A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things [J].
Groves, Bryan ;
Pu, Cong .
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
[7]   A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT) [J].
Hammi, Badis ;
Fayad, Achraf ;
Khatoun, Rida ;
Zeadally, Sherali ;
Begriche, Youcef .
IEEE SYSTEMS JOURNAL, 2020, 14 (03) :3440-3450
[8]   Secure UAV Communication Networks over 5G [J].
Li, Bin ;
Fei, Zesong ;
Zhang, Yan ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) :114-120
[9]   The association between metabolic syndrome and benign prostatic hyperplasia: a systematic review and meta-analysis [J].
Li, Jinze ;
Peng, Lei ;
Cao, Dehong ;
Gou, Haocheng ;
Li, Yunxiang ;
Wei, Qiang .
AGING MALE, 2020, 23 (05) :1388-1399
[10]  
MRaihi D., 2011, INTERNET ENG TASK FO