UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks

被引:40
作者
Emygdio de Melo, Carlos Felipe [1 ]
Silva, Tulio Dapper E. [1 ]
Boeira, Felipe [2 ]
Stocchero, Jorgito Matiuzzi [1 ]
Vinel, Alexey [3 ]
Asplund, Mikael [2 ]
de Freitas, Edison Pignaton [1 ]
机构
[1] Fed Univ Rio Grande do Sul UFRGS, Grad Program Elect Engn, BR-90035190 Porto Alegre, RS, Brazil
[2] Linkoping Univ, Dept Comp & Informat Sci, S-58183 Linkoping, Sweden
[3] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
关键词
Drones; Authentication; Ad hoc networks; Security; Protocols; Blockchain; Surveillance; Distributed applications; inter-drone communications; Sybil attack; security protocols; unmanned aerial vehicles; UNMANNED AERIAL VEHICLES; PRIVACY; SURVEILLANCE; DRONES;
D O I
10.1109/ACCESS.2021.3087084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging surveillance applications of UAV teams rely on secure communication to exchange information, coordinate their movements, and fulfill mission objectives. Protecting the network by identifying malicious nodes that are trying to disturb the system is an important task, particularly in the military domain. This paper presents the design and evaluation of UAVouch, an identity and location validation scheme that combines a public-key based authentication mechanism with a movement plausibility check for groups of UAVs. The key idea of UAVouch is to supplement the authentication mechanism by periodically checking the plausibility of the locations of neighboring UAVs, allowing the detection of intruders that are unable to follow expected trajectories. The proposed solution was evaluated in a simulated military surveillance scenario in which it detected malicious nodes' position falsification attacks with an average accuracy of above 85%.
引用
收藏
页码:82930 / 82946
页数:17
相关论文
共 39 条
[1]  
Adams C., 2005, ENCY CRYPTOGRAPHY SE, P286
[2]  
Agencia Nacional de Aviacao Civil, 2019, REG DRON BRAZ 2017 2 REG DRON BRAZ 2017 2
[3]  
Aggarwal S, 2019, 2019 IEEE International Conference on Communications (ICC), P1, DOI DOI 10.1109/ICC.2019
[4]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[5]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy, Riham ;
Youssef, Amr M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[6]  
[Anonymous], 2017, P IEEE INT S NETWORK, DOI DOI 10.1109/NCA.2017.8171390
[7]  
Boeira F., 2018, P 21 ACM INT C MOD A, P241
[8]   Decentralized proof of location in vehicular Ad Hoc networks [J].
Boeira, Felipe ;
Asplund, Mikael ;
Barcellos, Marinho .
COMPUTER COMMUNICATIONS, 2019, 147 :98-110
[9]  
Boeira F, 2017, IEEE VEHIC NETW CONF, P53, DOI 10.1109/VNC.2017.8275641
[10]  
Chowdhery A, 2018, IEEE INT CONF SENS, P19