Abstract
With the rapid development of unmanned aerial vehicle (UAV) technology in multiple fields, there are more and more scenarios needed to complete tasks through UAV communication and collaboration, and naturally, the need for cross-domain authentication and confidential communication has been proposed. Nowadays, sensor technology and Internet of Things technology continue to develop, and UAV technology has become more and more mature, and it has become a popular industry. Due to the high-speed mobility of UAV and the variation of network environment, it is difficult for the traditional cross-domain authentication based on CA certificate to meet the needs. Because on the one hand, CA online support is difficult to guarantee, on the other hand, certificate verification will also increase the delay. Therefore, how to achieve rapid certification in the process of cooperation in different domains has become a temporary research hot topic and difficulty. Based on the newly emerged unified multi-domain identity authentication (UMIA) technology and the lightweight cryptographic algorithm, this paper proposes a new idea of constructing a UAV management system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kohnfelder, L.M.: Towards a practical public-key cryptosystem. Massachusetts Institute of Technology (1978)
Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38–43 (1999)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Tsujii, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989)
Chunlai, D., Mingzeng, H., Hongli, Z.: An authentication-based mobile ad hoc key management framework in elliptic curve domains. J. Commun. 2007(12), 53–59 (2007). (In chinese)
Xianghao, N., Zhong, C.: Introduction to network security technology. Comput. Secur. 2003(30), 76–76 (2003). (In chinese)
Yifa, L., Duo, C., Mengyang, X.: A flexible and configurable combined public key scheme. ICAIS2022 (In press)
Al-Riyami, S.S., Kenneth, G.P.: Certificateless public key cryptography. In: Laih, C.S. (ed.) ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452–473. Springer, Berlin, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Yakubov, A., Shbair, W., Wallbom, A., Sanda, D.: A blockchain-based PKI management framework network operations and management symposium (2018)
Yuchen, W., Wenhui, Q., Lizhen, X.: Blockchain-based drone swarm security collaboration. Comput. Sci. 48(S2), 528–532+546 (2021). (In Chinese)
Zhicheng, Z., Lixin, L., Zuohui, Li.: Efficient cross-domain authentication scheme based on blockchain technology. Comput. Appl. 38(02), 316–320+326 (2018). (In Chinese)
Aqsa, R., et al.: Blockchain-based public key infrastructure: a transparent digital certification mechanism for secure communication. IEEE Netw. (2021)
Xueman, K., Mengyang, X.: Key processing method, device and system based on unified multi-domain identification (In Chinese)
Yifa, L., Yu, G., Xueman, K.: A cross-domain authenticated key management scheme for the internet of UAVs. In: ICAIS2022 (In press)
Zeng, Y., Zhang, R.: Energy-efficient UAV communication with trajectory optimization. IEEE Trans. Wireless Commun. 16(6), 3747–3760 (2017)
Zeng, Y., Qingqing, W., Zhang, R.: Accessing from the sky: a tutorial on UAV communications for 5G and beyond. Proc. IEEE 107(12), 2327–2375 (2019)
Zhang, G., Qingqing, W., Cui, M., Zhang, R.: Securing UAV communications via joint trajectory and power control. IEEE Trans. Wireless Commun. 18(2), 1376–1389 (2019)
Zhou, X., Qingqing, W., Yan, S., et al.: UAV-enabled secure communications: joint trajectory and transmit power optimization. IEEE Trans. Veh. Technol. 68(4), 4069–4073 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, G., Geng, Y., Kong, X., Li, Y. (2022). Construction of a New UAV Management System Based on UMIA Technology. In: Ge, C., Guo, F. (eds) Provable and Practical Security. ProvSec 2022. Lecture Notes in Computer Science, vol 13600. Springer, Cham. https://doi.org/10.1007/978-3-031-20917-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-20917-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20916-1
Online ISBN: 978-3-031-20917-8
eBook Packages: Computer ScienceComputer Science (R0)