Skip to main content

Construction of a New UAV Management System Based on UMIA Technology

  • Conference paper
  • First Online:
Provable and Practical Security (ProvSec 2022)

Abstract

With the rapid development of unmanned aerial vehicle (UAV) technology in multiple fields, there are more and more scenarios needed to complete tasks through UAV communication and collaboration, and naturally, the need for cross-domain authentication and confidential communication has been proposed. Nowadays, sensor technology and Internet of Things technology continue to develop, and UAV technology has become more and more mature, and it has become a popular industry. Due to the high-speed mobility of UAV and the variation of network environment, it is difficult for the traditional cross-domain authentication based on CA certificate to meet the needs. Because on the one hand, CA online support is difficult to guarantee, on the other hand, certificate verification will also increase the delay. Therefore, how to achieve rapid certification in the process of cooperation in different domains has become a temporary research hot topic and difficulty. Based on the newly emerged unified multi-domain identity authentication (UMIA) technology and the lightweight cryptographic algorithm, this paper proposes a new idea of constructing a UAV management system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kohnfelder, L.M.: Towards a practical public-key cryptosystem. Massachusetts Institute of Technology (1978)

    Google Scholar 

  2. Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38–43 (1999)

    Article  Google Scholar 

  3. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  4. Tsujii, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989)

    Article  Google Scholar 

  5. Chunlai, D., Mingzeng, H., Hongli, Z.: An authentication-based mobile ad hoc key management framework in elliptic curve domains. J. Commun. 2007(12), 53–59 (2007). (In chinese)

    Google Scholar 

  6. Xianghao, N., Zhong, C.: Introduction to network security technology. Comput. Secur. 2003(30), 76–76 (2003). (In chinese)

    Google Scholar 

  7. Yifa, L., Duo, C., Mengyang, X.: A flexible and configurable combined public key scheme. ICAIS2022 (In press)

    Google Scholar 

  8. Al-Riyami, S.S., Kenneth, G.P.: Certificateless public key cryptography. In: Laih, C.S. (ed.) ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452–473. Springer, Berlin, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  9. Yakubov, A., Shbair, W., Wallbom, A., Sanda, D.: A blockchain-based PKI management framework network operations and management symposium (2018)

    Google Scholar 

  10. Yuchen, W., Wenhui, Q., Lizhen, X.: Blockchain-based drone swarm security collaboration. Comput. Sci. 48(S2), 528–532+546 (2021). (In Chinese)

    Google Scholar 

  11. Zhicheng, Z., Lixin, L., Zuohui, Li.: Efficient cross-domain authentication scheme based on blockchain technology. Comput. Appl. 38(02), 316–320+326 (2018). (In Chinese)

    Google Scholar 

  12. Aqsa, R., et al.: Blockchain-based public key infrastructure: a transparent digital certification mechanism for secure communication. IEEE Netw. (2021)

    Google Scholar 

  13. Xueman, K., Mengyang, X.: Key processing method, device and system based on unified multi-domain identification (In Chinese)

    Google Scholar 

  14. Yifa, L., Yu, G., Xueman, K.: A cross-domain authenticated key management scheme for the internet of UAVs. In: ICAIS2022 (In press)

    Google Scholar 

  15. Zeng, Y., Zhang, R.: Energy-efficient UAV communication with trajectory optimization. IEEE Trans. Wireless Commun. 16(6), 3747–3760 (2017)

    Article  Google Scholar 

  16. Zeng, Y., Qingqing, W., Zhang, R.: Accessing from the sky: a tutorial on UAV communications for 5G and beyond. Proc. IEEE 107(12), 2327–2375 (2019)

    Article  Google Scholar 

  17. Zhang, G., Qingqing, W., Cui, M., Zhang, R.: Securing UAV communications via joint trajectory and power control. IEEE Trans. Wireless Commun. 18(2), 1376–1389 (2019)

    Article  Google Scholar 

  18. Zhou, X., Qingqing, W., Yan, S., et al.: UAV-enabled secure communications: joint trajectory and transmit power optimization. IEEE Trans. Veh. Technol. 68(4), 4069–4073 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ge Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, G., Geng, Y., Kong, X., Li, Y. (2022). Construction of a New UAV Management System Based on UMIA Technology. In: Ge, C., Guo, F. (eds) Provable and Practical Security. ProvSec 2022. Lecture Notes in Computer Science, vol 13600. Springer, Cham. https://doi.org/10.1007/978-3-031-20917-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20917-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20916-1

  • Online ISBN: 978-3-031-20917-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics