{"title":"An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments","authors":"Anfal Ayad, Y. Hammal","doi":"10.1109/icnas53565.2021.9628966","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicle (UAV) fleets are the focus of various nations nowadays. Thus, it is expected to witness an explosion of reliability and safety critical UAV-based applications. Moreover, the recent surge of research on applied artificial intelligence and the industry advancement encourage the use of cooperative UAV fleets that offer potential collaborations even between UAVs from different organizations. The untrusted nature of the operation environments in addition to the high level of criticality of such applications require stringent secure protocols. There have been several security protocol proposals to ensure authentication, confidentiality and integrity, yet the overhead generated by these solutions and their impact on performance still severely hamper UAV endurance. In this paper, we propose to tackle the problem of secure communications within dynamic UAV fleets in open public networks using a pairing free Certificateless-Authenticated Group Key Agreement (CL-AGKA) scheme with constant rounds that meets efficiency and strong security. The formal security validation of the proposed protocol has been done by using Automated Validation of Internet Security Protocols and Applications tool (AVISPA). The aforementioned tool revealed that the proposed protocol is resilient against several attacks. More important, the computation cost has been significantly reduced thanks to the elimination of the expensive pairing operations and to the integration of the signature scheme into the key agreement to build one efficient algorithm.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Advanced Systems (ICNAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icnas53565.2021.9628966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Unmanned aerial vehicle (UAV) fleets are the focus of various nations nowadays. Thus, it is expected to witness an explosion of reliability and safety critical UAV-based applications. Moreover, the recent surge of research on applied artificial intelligence and the industry advancement encourage the use of cooperative UAV fleets that offer potential collaborations even between UAVs from different organizations. The untrusted nature of the operation environments in addition to the high level of criticality of such applications require stringent secure protocols. There have been several security protocol proposals to ensure authentication, confidentiality and integrity, yet the overhead generated by these solutions and their impact on performance still severely hamper UAV endurance. In this paper, we propose to tackle the problem of secure communications within dynamic UAV fleets in open public networks using a pairing free Certificateless-Authenticated Group Key Agreement (CL-AGKA) scheme with constant rounds that meets efficiency and strong security. The formal security validation of the proposed protocol has been done by using Automated Validation of Internet Security Protocols and Applications tool (AVISPA). The aforementioned tool revealed that the proposed protocol is resilient against several attacks. More important, the computation cost has been significantly reduced thanks to the elimination of the expensive pairing operations and to the integration of the signature scheme into the key agreement to build one efficient algorithm.