{"title":"保护无人机网络:一个安全的轻量级认证和密钥协议方案","authors":"Hulya Dogan","doi":"10.1109/CSP58884.2023.00010","DOIUrl":null,"url":null,"abstract":"Flexible and convenient unmanned aerial vehicles (UAVs), efficient low-altitude alternatives with complex connectivity, serve exciting applications by expanding the versatility of traditional networks and the integration capacity between air and ground nodes. UAVs network trust secure communication to perform the role objectives, enable and coordinate dispatches. However, more efforts are needed toward security by protecting every entity against malicious attacks in the network. One open challenge in the UAV network lies in keeping bad actors out of the network and enabling security features for highly heterogeneous and resource-hungry devices (sensors, nodes, actuators). To handle that, we design a new practical security scheme to authenticate the legitimacy of peer device connectivity that is lightweight and secure for UAVs network. The proposed protocol provides mutual authentication between UAV and base station devices. We present a formal security verification using the ProVerif tool as well as old-fashioned cryptanalysis to show that the scheme facilitates various security credentials, such as confidentiality, data integrity, identity privacy, etc., and is resilient against well-known security attacks that impersonation, replay, and forwarding security attacks. We also compare our protocol's performance evaluation (of test-bed) results with state-of-the-art authentication protocols for UAVs based on computation costs.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Protecting UAV-Networks: A Secure Lightweight Authentication and Key Agreement Scheme\",\"authors\":\"Hulya Dogan\",\"doi\":\"10.1109/CSP58884.2023.00010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Flexible and convenient unmanned aerial vehicles (UAVs), efficient low-altitude alternatives with complex connectivity, serve exciting applications by expanding the versatility of traditional networks and the integration capacity between air and ground nodes. UAVs network trust secure communication to perform the role objectives, enable and coordinate dispatches. However, more efforts are needed toward security by protecting every entity against malicious attacks in the network. One open challenge in the UAV network lies in keeping bad actors out of the network and enabling security features for highly heterogeneous and resource-hungry devices (sensors, nodes, actuators). To handle that, we design a new practical security scheme to authenticate the legitimacy of peer device connectivity that is lightweight and secure for UAVs network. The proposed protocol provides mutual authentication between UAV and base station devices. We present a formal security verification using the ProVerif tool as well as old-fashioned cryptanalysis to show that the scheme facilitates various security credentials, such as confidentiality, data integrity, identity privacy, etc., and is resilient against well-known security attacks that impersonation, replay, and forwarding security attacks. We also compare our protocol's performance evaluation (of test-bed) results with state-of-the-art authentication protocols for UAVs based on computation costs.\",\"PeriodicalId\":255083,\"journal\":{\"name\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSP58884.2023.00010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protecting UAV-Networks: A Secure Lightweight Authentication and Key Agreement Scheme
Flexible and convenient unmanned aerial vehicles (UAVs), efficient low-altitude alternatives with complex connectivity, serve exciting applications by expanding the versatility of traditional networks and the integration capacity between air and ground nodes. UAVs network trust secure communication to perform the role objectives, enable and coordinate dispatches. However, more efforts are needed toward security by protecting every entity against malicious attacks in the network. One open challenge in the UAV network lies in keeping bad actors out of the network and enabling security features for highly heterogeneous and resource-hungry devices (sensors, nodes, actuators). To handle that, we design a new practical security scheme to authenticate the legitimacy of peer device connectivity that is lightweight and secure for UAVs network. The proposed protocol provides mutual authentication between UAV and base station devices. We present a formal security verification using the ProVerif tool as well as old-fashioned cryptanalysis to show that the scheme facilitates various security credentials, such as confidentiality, data integrity, identity privacy, etc., and is resilient against well-known security attacks that impersonation, replay, and forwarding security attacks. We also compare our protocol's performance evaluation (of test-bed) results with state-of-the-art authentication protocols for UAVs based on computation costs.