{"title":"基于零信任的高效无人机群认证方案","authors":"Dongyu Yang, Yue Zhao, Kaijun Wu, Xiaoyu Guo, Haiyang Peng","doi":"10.1109/NaNA53684.2021.00068","DOIUrl":null,"url":null,"abstract":"In recent years, the concept of UAV (Unmanned Aerial Vehicle) swarm has been proposed and developed, which effectively solves the shortcomings of relatively small payload and relatively weak information perception processing capability in a single UAV operation. The research and application of UAV swarm technology has become an important direction of the development of UAV technology. UAV swarm not only can effectively improve the load capacity and information processing capacity through close cooperation between single UAV, but also has a high “self-healing” ability and strong robustness. However, due to the limited computing resources and complex external environment of UAVs, UAV swarm are vulnerable to forgery attacks, man-in-the-middle attacks and reply attacks. It is necessary to establish an authentication scheme to ensure the legitimate and reliable identity of UAVs for data exchange and sharing. However, traditional authentication schemes based on username, password or dynamic key have lower security levels, while RSA authentication requires a long session key and cannot meet the lightweight requirements in an UAV swarm. Based on the analysis and summary of existing authentication technologies and the special requirements of UAV swarm for cyber security, this paper puts forward an authentication scheme based on Zero Trust, achieves rapid authentication of UAV swarm in data exchange and sharing, and strengthens its ability to respond to cyber attacks.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An efficient authentication scheme based on Zero Trust for UAV swarm\",\"authors\":\"Dongyu Yang, Yue Zhao, Kaijun Wu, Xiaoyu Guo, Haiyang Peng\",\"doi\":\"10.1109/NaNA53684.2021.00068\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, the concept of UAV (Unmanned Aerial Vehicle) swarm has been proposed and developed, which effectively solves the shortcomings of relatively small payload and relatively weak information perception processing capability in a single UAV operation. The research and application of UAV swarm technology has become an important direction of the development of UAV technology. UAV swarm not only can effectively improve the load capacity and information processing capacity through close cooperation between single UAV, but also has a high “self-healing” ability and strong robustness. However, due to the limited computing resources and complex external environment of UAVs, UAV swarm are vulnerable to forgery attacks, man-in-the-middle attacks and reply attacks. It is necessary to establish an authentication scheme to ensure the legitimate and reliable identity of UAVs for data exchange and sharing. However, traditional authentication schemes based on username, password or dynamic key have lower security levels, while RSA authentication requires a long session key and cannot meet the lightweight requirements in an UAV swarm. Based on the analysis and summary of existing authentication technologies and the special requirements of UAV swarm for cyber security, this paper puts forward an authentication scheme based on Zero Trust, achieves rapid authentication of UAV swarm in data exchange and sharing, and strengthens its ability to respond to cyber attacks.\",\"PeriodicalId\":414672,\"journal\":{\"name\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA53684.2021.00068\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An efficient authentication scheme based on Zero Trust for UAV swarm
In recent years, the concept of UAV (Unmanned Aerial Vehicle) swarm has been proposed and developed, which effectively solves the shortcomings of relatively small payload and relatively weak information perception processing capability in a single UAV operation. The research and application of UAV swarm technology has become an important direction of the development of UAV technology. UAV swarm not only can effectively improve the load capacity and information processing capacity through close cooperation between single UAV, but also has a high “self-healing” ability and strong robustness. However, due to the limited computing resources and complex external environment of UAVs, UAV swarm are vulnerable to forgery attacks, man-in-the-middle attacks and reply attacks. It is necessary to establish an authentication scheme to ensure the legitimate and reliable identity of UAVs for data exchange and sharing. However, traditional authentication schemes based on username, password or dynamic key have lower security levels, while RSA authentication requires a long session key and cannot meet the lightweight requirements in an UAV swarm. Based on the analysis and summary of existing authentication technologies and the special requirements of UAV swarm for cyber security, this paper puts forward an authentication scheme based on Zero Trust, achieves rapid authentication of UAV swarm in data exchange and sharing, and strengthens its ability to respond to cyber attacks.