Abstract
The security hazards in the digital sky of drones urges for lightweight and secure defense mechanisms against several cyber-attacks on drone networks. The main issues in a surveillance drone network are identification of valid drones, maintaining boundaries and information security along with physical security. To address these issues we are proposing a lightweight and secure drone-to-ground station and drone-to-drone mutual authentication protocol, PUFloc, using Physical unclonable functions (PUFs) and drone location data. PUFloc ensures attack resiliency and fail safe operation and uses only hash functions, XOR operations, PUF and random number generators. This is the first work that addresses physical security along with location validation of drones for mutually authenticating the drone with the ground station with minimum resource overheads and maximum security. Formal security analysis is done using random oracle model and ProVerif tool and informal security analysis also proves the resistance of our protocol against several possible attacks. FPGA implementation of the major cryptographic operations to estimate the power consumption and resource utilization show that the operations are lightweight to be implemented on drones. The analysis of performance and security and their comparison with existing works showcase the merit of PUFloc over other protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
What is Unmanned Aircraft Systems Traffic Management? https://www.faa.gov/uas/research_development/traffic_management/
Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30580-4_6
Ali, Z., Chaudhry, S.A., Ramzan, M.S., Al-Turjman, F.: Securing smart city surveillance: a lightweight authentication mechanism for unmanned vehicles. IEEE Access 8, 43711–43724 (2020)
Alladi, T., Chamola, V., Kumar, N., et al.: PARTH: a two-stage lightweight mutual authentication protocol for UAV surveillance networks. Comput. Commun. 160, 81–90 (2020)
Alladi, T., Naren, N., Bansal, G., Chamola, V., Guizani, M.: SecAuthUAV: a novel authentication scheme for UAV-base station scenario. IEEE Trans. Veh. Technol. 69, 15068–15077 (2020)
Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: SPONGENT: the design space of lightweight cryptographic hashing. IEEE Trans. Comput. 62(10), 2041–2053 (2012)
Chang, C.C., Le, H.D.: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wireless Commun. 15(1), 357–366 (2015)
Chen, C.L., Deng, Y.Y., Weng, W., Chen, C.H., Chiu, Y.J., Wu, C.M.: A traceable and privacy-preserving authentication for UAV communication control system. Electronics 9(1), 62 (2020)
Cho, G., Cho, J., Hyun, S., Kim, H.: SENTINEL: a secure and efficient authentication framework for unmanned aerial vehicles. Appl. Sci. 10(9), 3149 (2020)
Devi, M., Maakar, S.K., Sinwar, D., Jangid, M., Sangwan, P.: Applications of flying ad-hoc network during COVID-19 pandemic. In: IOP Conference Series: Materials Science and Engineering, vol. 1099, p. 012005. IOP Publishing (2021)
de la Fraga, L.G., Torres-Pérez, E., Tlelo-Cuautle, E., Mancillas-López, C.: Hardware implementation of pseudo-random number generators based on chaotic maps. Nonlinear Dyn. 90(3), 1661–1670 (2017). https://doi.org/10.1007/s11071-017-3755-z
Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 15(9), 4957–4968 (2019)
Gope, P., Millwood, O., Saxena, N.: A provably secure authentication scheme for RFID-enabled UAV applications. Comput. Commun. 166, 19–25 (2021)
Gope, P., Sikdar, B.: An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Trans. Veh. Technol. 69(11), 13621–13630 (2020)
Hassanalian, M., Abdelkefi, A.: Classifications, applications, and design challenges of drones: a review. Prog. Aerosp. Sci. 91, 99–131 (2017)
He, S., Wu, Q., Liu, J., Hu, W., Qin, B., Li, Y.-N.: Secure communications in unmanned aerial vehicle network. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 601–620. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72359-4_37
Hossain, M., Noor, S., Hasan, R.: HSC-IoT: a hardware and software co-verification based authentication scheme for internet of things. In: 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 109–116. IEEE (2017)
Huang, Z., Wang, Q.: A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 23(2), 1057–1088 (2020)
Jaffal, R., Mohd, B.J., Al-Shayeji, M., et al.: An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster Comput. 24, 1–20 (2021)
Jan, S.U., Qayum, F., Khan, H.U.: Design and analysis of lightweight authentication protocol for securing IoD. IEEE Access 9, 69287–69306 (2021)
Jungk, B., Lima, L.R., Hiller, M.: A systematic study of lightweight hash functions on FPGAs. In: 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig 2014), pp. 1–6. IEEE (2014)
Lamothe, D.: U.S. and Britain hacked into feeds from Israeli drones and fighter jets, according to report (2015). https://www.washingtonpost.com/news/checkpoint/wp/2016/01/29/u-s-and-britain-hacked-into-feeds-from-israeli-drones-and-fighter-jets-according-to-report. Accessed 29 Jan 2016
Lei, Y., Zeng, L., Li, Y.X., Wang, M.X., Qin, H.: A lightweight authentication protocol for UAV networks based on security and computational resource optimization. IEEE Access 9, 53769–53785 (2021)
Li, S., Zhang, T., Yu, B., He, K.: A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT. IEEE Sens. J. 21, 5487–5501 (2020)
Nikooghadam, M., Amintoosi, H., Islam, S.H., Moghadam, M.F.: A provably secure and lightweight authentication scheme for internet of drones for smart city surveillance. J. Syst. Architect. 115, 101955 (2021)
Nyangaresi, V.O., Petrovic, N.: Efficient PUF based authentication protocol for internet of drones. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE (2021)
Pal, V., Acharya, B.S., Shrivastav, S., Saha, S., Joglekar, A., Amrutur, B.: PUF based secure framework for hardware and software security of drones. In: 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 01–06. IEEE (2020)
Porche, I.R.: Cyberwarfare Goes Wireless (2015). https://www.usnews.com/opinion/blogs/world-report/2014/04/04/russia-hacks-a-us-drone-in-crimea-as-cyberwarfare-has-gone-wireless. Accessed 4 April 2014
Pu, C., Li, Y.: Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system. In: 2020 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), pp. 1–6. IEEE (2020)
Rodrigues, M., Amaro, J., Osório, F.S., Branco Kalinka, R.L.J.C.: Authentication methods for UAV communication. In: 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1210–1215. IEEE (2019)
Semal, B., Markantonakis, K., Akram, R.N.: A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), pp. 1–8. IEEE (2018)
Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.J.: TCALAS: temporal credential-based anonymous lightweight authentication scheme for internet of drones environment. IEEE Trans. Veh. Technol. 68(7), 6903–6916 (2019)
Tanveer, M., Zahid, A.H., Ahmad, M., Baz, A., Alhakami, H.: LAKE-IoD: lightweight authenticated key exchange protocol for the internet of drone environment. IEEE Access 8, 155645–155659 (2020)
Thompson, C.: Drug traffickers are hacking US surveillance drones to get past border patrol (2015). https://www.businessinsider.com/drug-traffickers-are-hacking-us-border-drones-2015-12?IR=T. Accessed 30 Dec 2015
Tian, Y., Yuan, J., Song, H.: Efficient privacy-preserving authentication framework for edge-assisted internet of drones. J. Inf. Secur. Appl. 48, 102354 (2019)
Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V., Rodrigues, J.J.: Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet Things J. 6(2), 3572–3584 (2018)
Won, J., Seo, S.H., Bertino, E.: Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 5, 3721–3749 (2017)
Zhang, Y., He, D., Li, L., Chen, B.: A lightweight authentication and key agreement scheme for internet of drones. Comput. Commun. 154, 455–464 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nair, A.S., Thampi, S.M. (2022). PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds) Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol 1557. Springer, Singapore. https://doi.org/10.1007/978-981-19-0468-4_6
Download citation
DOI: https://doi.org/10.1007/978-981-19-0468-4_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0467-7
Online ISBN: 978-981-19-0468-4
eBook Packages: Computer ScienceComputer Science (R0)