{"title":"UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted","authors":"Chunpeng Liu;Tao Huang;Maode Ma","doi":"10.1109/OJVT.2025.3567079","DOIUrl":null,"url":null,"abstract":"In recent years, advancements in Unmanned Aerial Vehicle (UAV) technology have led to the emergence of the Internet of Drones (IoD), further enhanced by the capabilities of 5th generation mobile network (5G). UAVs are widely used in various applications, such as disaster assessment, material delivery, and environmental monitoring, due to their flexibility. However, operating in insecure open environments presents significant risks, making it crucial to complete tasks without exposing sensitive information to attackers or unauthorized users. Additionally, the communication range between UAVs and ground stations is often limited, and if a UAV flies beyond this range, the likelihood of mission failure increases substantially. To address these challenges, we propose a UAV-assisted Authentication Protocol (UAP) based on Physical Unclonable Functions (PUFs), leveraging 5G to enable secure relay communication between UAVs and ground stations. We provide formal proof of the protocol's logical correctness and perform cryptanalysis, demonstrating that it effectively resists various security threats, including masquerade and replay attacks. Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. We have performed simulations on a Raspberry Pi. The experiments show that UAP has a computational overhead of 0.0826 ms and a communication overhead of 0.0408 ms. The application scenarios and security features of UAP are also considered, making it a solution for UAV applications.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"1539-1550"},"PeriodicalIF":4.8000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10988496","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of Vehicular Technology","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10988496/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, advancements in Unmanned Aerial Vehicle (UAV) technology have led to the emergence of the Internet of Drones (IoD), further enhanced by the capabilities of 5th generation mobile network (5G). UAVs are widely used in various applications, such as disaster assessment, material delivery, and environmental monitoring, due to their flexibility. However, operating in insecure open environments presents significant risks, making it crucial to complete tasks without exposing sensitive information to attackers or unauthorized users. Additionally, the communication range between UAVs and ground stations is often limited, and if a UAV flies beyond this range, the likelihood of mission failure increases substantially. To address these challenges, we propose a UAV-assisted Authentication Protocol (UAP) based on Physical Unclonable Functions (PUFs), leveraging 5G to enable secure relay communication between UAVs and ground stations. We provide formal proof of the protocol's logical correctness and perform cryptanalysis, demonstrating that it effectively resists various security threats, including masquerade and replay attacks. Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. We have performed simulations on a Raspberry Pi. The experiments show that UAP has a computational overhead of 0.0826 ms and a communication overhead of 0.0408 ms. The application scenarios and security features of UAP are also considered, making it a solution for UAV applications.