{"title":"A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones","authors":"Aiswarya S. Nair , Sabu M. Thampi , Jafeel V.","doi":"10.1016/j.vehcom.2024.100780","DOIUrl":null,"url":null,"abstract":"<div><p>With the increasing prevalence of drones, guaranteeing their authentication and secure communication has become paramount in drone networks to mitigate unauthorized access and malicious attacks. Cross-domain authentication is crucial in the context of the Internet of Drones (IoD) for safely verifying and establishing trust between diverse drones and their respective control stations, which may belong to different regions or organizations. Effectively accessing resources or services in another domain while maintaining security and efficiency poses a significant challenge. Conventional authentication mechanisms relying on challenging problems like discrete logarithm and integer factorization might not be sufficient to guarantee the security and effectiveness of drone-based systems in the post-quantum era. To address this, we propose a distributed post-quantum cryptography and Physical Unclonable Function (PUF) based cross-domain authentication protocol for IoD. Key contributions of this work include the elimination of secret key storage on drones, mutual authentication, emphasis on hardware security, incorporation of post-quantum security measures, efficient cross-domain authentication and resilience against cyber attacks such as eavesdropping, impersonation, replay attack, untraceability, and PUF-modeling attack. The performance of the proposed protocol is assessed utilizing metrics like processing time, communication cost and storage utilization. In operations associated to the blockchain ledger, variables such as latency, throughput, CPU utilization, and memory utilization are also examined. The protocol shows a reduced computation time and zero sensitive data storage in drone memory, despite a slightly higher communication cost that is manageable with 5G-enabled drones. Comparative analysis against existing solutions in the domain highlights the superior security of the proposed protocol, positioning it as a promising solution for the evolving quantum landscape.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100780"},"PeriodicalIF":5.8000,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vehicular Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S221420962400055X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
With the increasing prevalence of drones, guaranteeing their authentication and secure communication has become paramount in drone networks to mitigate unauthorized access and malicious attacks. Cross-domain authentication is crucial in the context of the Internet of Drones (IoD) for safely verifying and establishing trust between diverse drones and their respective control stations, which may belong to different regions or organizations. Effectively accessing resources or services in another domain while maintaining security and efficiency poses a significant challenge. Conventional authentication mechanisms relying on challenging problems like discrete logarithm and integer factorization might not be sufficient to guarantee the security and effectiveness of drone-based systems in the post-quantum era. To address this, we propose a distributed post-quantum cryptography and Physical Unclonable Function (PUF) based cross-domain authentication protocol for IoD. Key contributions of this work include the elimination of secret key storage on drones, mutual authentication, emphasis on hardware security, incorporation of post-quantum security measures, efficient cross-domain authentication and resilience against cyber attacks such as eavesdropping, impersonation, replay attack, untraceability, and PUF-modeling attack. The performance of the proposed protocol is assessed utilizing metrics like processing time, communication cost and storage utilization. In operations associated to the blockchain ledger, variables such as latency, throughput, CPU utilization, and memory utilization are also examined. The protocol shows a reduced computation time and zero sensitive data storage in drone memory, despite a slightly higher communication cost that is manageable with 5G-enabled drones. Comparative analysis against existing solutions in the domain highlights the superior security of the proposed protocol, positioning it as a promising solution for the evolving quantum landscape.
期刊介绍:
Vehicular communications is a growing area of communications between vehicles and including roadside communication infrastructure. Advances in wireless communications are making possible sharing of information through real time communications between vehicles and infrastructure. This has led to applications to increase safety of vehicles and communication between passengers and the Internet. Standardization efforts on vehicular communication are also underway to make vehicular transportation safer, greener and easier.
The aim of the journal is to publish high quality peer–reviewed papers in the area of vehicular communications. The scope encompasses all types of communications involving vehicles, including vehicle–to–vehicle and vehicle–to–infrastructure. The scope includes (but not limited to) the following topics related to vehicular communications:
Vehicle to vehicle and vehicle to infrastructure communications
Channel modelling, modulating and coding
Congestion Control and scalability issues
Protocol design, testing and verification
Routing in vehicular networks
Security issues and countermeasures
Deployment and field testing
Reducing energy consumption and enhancing safety of vehicles
Wireless in–car networks
Data collection and dissemination methods
Mobility and handover issues
Safety and driver assistance applications
UAV
Underwater communications
Autonomous cooperative driving
Social networks
Internet of vehicles
Standardization of protocols.