Skip to main content

A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones

  • Conference paper
  • First Online:
Book cover Quality, Reliability, Security and Robustness in Heterogeneous Systems (QShine 2021)

Abstract

Drones are being diversely used in various areas due to their low price. Most of the use cases demand a secure and reliable wireless communication infrastructure to ensure the quality of service. Such demand boosts the deployment of drones in 5G cellular network. The ground base station (BS) is the main component associated with drones in the 5G cellular network. However, the BS in 5G currently broadcasts the system information message without authentication protection. This poses serious security concerns as the system information message will be used to build connection between the BS and cellular devices. Particularly, adversaries can masquerade as BSs, connect drones, and obtain the data captured by them. Although some attacks have been prevented due to the recent enhancements for 5G cellular protocols, the root vulnerability for the bootstrap phase between drones and the BS still existed and not fixed yet.

In this work, we consider a scenario where drones are used in a sport venue to capture the match and 5G cellular network is used to disseminate the live stream. To protect drones from fake BSs, we adopt and optimise the authentication protocol proposed by Singla et al. in [26]. Basically, we modify its architecture by deploying aerial balloon drone BSs over the sport venues to provide more reliable communication service. Moreover, we optimise the verification process in order to reduce the computation overhead on drones. We implemented a prototype of the protocol and evaluated its performance. The experiment results show our authentication protocol is practical to be adopted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Specification number TR 33.809 version 0.8.0. In: Study on 5G security enhancements against false base stations. 3GPP (2020)

    Google Scholar 

  2. Alrashede, H., Shaikh, R.A.: IMSI catcher detection method for cellular networks. In: 2019 2nd International Conference on Computer Applications and Information Security (ICCAIS), pp. 1–6. IEEE (2019)

    Google Scholar 

  3. BlueKrypt: Cryptographic key length recommendation. https://www.keylength.com/en/4/. Accessed 14 June 2021

  4. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004). https://doi.org/10.1007/s00145-004-0314-9

    Article  MathSciNet  MATH  Google Scholar 

  5. Boyd, C. (ed.): ASIACRYPT 2001. LNCS, vol. 2248. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1

    Book  MATH  Google Scholar 

  6. Cheng, Z.: The SM9 cryptographic schemes. IACR Cryptol. ePrint Arch. 2017, 117 (2017). http://eprint.iacr.org/2017/117

  7. Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.R.: IMSI-catch me if you can: IMSI-catcher-catchers. In: Jordan, C.N.P., Hahn, A., Butler, K.R.B., Sherr, M. (eds.) Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, 8–12 December 2014, pp. 246–255. ACM (2014). https://doi.org/10.1145/2664243.2664272

  8. Gentry, C., Silverberg, A.: Hierarchical ID-Based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_34

    Chapter  Google Scholar 

  9. Gharsallah, I., Smaoui, S., Zarai, F.: A secure efficient and lightweight authentication protocol for 5G cellular networks: Sel-aka. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1311–1316. IEEE (2019)

    Google Scholar 

  10. Google loon project main page (2011). https://loon.com/. Accessed 23 April 2021

  11. Mbbf2017 connected aerial vehicle live (2017). https://www.huawei.com/au/technology-insights/industry-insights/outlook/mobile-broadband/xlabs/use-cases/mbbf2017-connected-aerial-vehicle-live. Accessed 23 April 2021

  12. Huo, Y., Dong, X., Lu, T., Xu, W., Yuen, M.: Distributed and multi-layer UAV network for the next-generation wireless communication (2018)

    Google Scholar 

  13. Hussain, S.R., Echeverria, M., Chowdhury, O., Li, N., Bertino, E.: Privacy attacks to the 4G and 5g cellular paging protocols using side channel information. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, 24–27 February 2019. The Internet Society (2019)

    Google Scholar 

  14. Hussain, S.R., Echeverria, M., Singla, A., Chowdhury, O., Bertino, E.: Insecure connection bootstrapping in cellular networks: the root of all evil. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, 15–17 May 2019, pp. 1–11. ACM (2019). https://doi.org/10.1145/3317549.3323402

  15. Jin, J., Lian, C., Xu, M.: Rogue base station detection using a machine learning approach. In: 28th Wireless and Optical Communications Conference, WOCC 2019, Beijing, China, 9–10 May 2019, pp. 1–5. IEEE (2019). https://doi.org/10.1109/WOCC.2019.8770554

  16. Lilly, A.: IMSI catchers: hacking mobile communications. Netw. Secur. 2017(2), 5–7 (2017). https://doi.org/10.1016/S1353-4858(17)30014-4

    Article  Google Scholar 

  17. Maguire, Y.: Building communications networks in the stratosphere (2015). https://engineering.fb.com/2015/07/30/connectivity/building-communications-networks-in-the-stratosphere/. Accessed 23 April 2021

  18. Mortimer, G.: Stadiums and arenas are keeping the good drones in, and the spies out with dedrone (2017). https://www.suasnews.com/2017/03/stadiums-arenas-keeping-good-drones-spies-dedrone/. Accessed 23 April 2021

  19. Naqvi, S.A.R., Hassan, S.A., Pervaiz, H., Ni, Q.: Drone-aided communication as a key enabler for 5G and resilient public safety networks. IEEE Commun. Mag. 56(1), 36–42 (2018). https://doi.org/10.1109/MCOM.2017.1700451

    Article  Google Scholar 

  20. Nassi, B., Shabtai, A., Masuoka, R., Elovici, Y.: Sok - security and privacy in the age of drones: Threats, challenges, solution mechanisms, and scientific gaps. CoRR abs/1903.05155 (2019). http://arxiv.org/abs/1903.05155

  21. Pycrypto 2.6.1. https://pypi.org/project/pycrypto/. Accessed 14 June 2021

  22. Python 3.7.0. https://www.python.org/downloads/release/python-370/. Accessed 14 June 2021

  23. Research, Markets: Global cellular-connected drone market analysis and forecast, 2020–2023 and 2030 (2020). https://www.globenewswire.com/en/news-release/2020/10/30/2117598/28124/en/Global-Cellular-Connected-Drone-Market-Analysis-Forecast-2020-2023-2030.html. Accessed 13 June 13 2021

  24. Shaik, A., Borgaonkar, R., Park, S., Seifert, J.: On the impact of rogue base stations in 4G/LTE self organizing networks. In: Papadimitratos, P., Butler, K.R.B., Pöpper, C. (eds.) Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, 18–20 June 2018, pp. 75–86. ACM (2018). https://doi.org/10.1145/3212480.3212497

  25. Shaik, A., Borgaonkar, R., Park, S., Seifert, J.: New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, 15–17 May 2019, pp. 221–231. ACM (2019). https://doi.org/10.1145/3317549.3319728

  26. Singla, A., Behnia, R., Hussain, S.R., Yavuz, A.A., Bertino, E.: Look before you leap: Secure connection bootstrapping for 5g networks to defend against fake base-stations. In: Cao, J., Au, M.H., Lin, Z., Yung, M. (eds.) ASIA CCS 2021: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, 7–11 June 2021, pp. 501–515. ACM (2021)

    Google Scholar 

  27. Ullah, H., Nair, N.G., Moore, A., Nugent, C.D., Muschamp, P., Cuevas, M.: 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access 7, 37251–37268 (2019). https://doi.org/10.1109/ACCESS.2019.2905347

    Article  Google Scholar 

  28. Yang, G., et al.: A telecom perspective on the internet of drones: From LTE-advanced to 5G. CoRR abs/1803.11048 (2018)

    Google Scholar 

  29. Zeng, Y., Lyu, J., Zhang, R.: Cellular-connected UAV: potential, challenges, and promising technologies. IEEE Wirel. Commun. 26(1), 120–127 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shujie Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, S., Cui, S., Liu, J. (2021). A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones. In: Yuan, X., Bao, W., Yi, X., Tran, N.H. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-91424-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91424-0_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91423-3

  • Online ISBN: 978-3-030-91424-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics