Skip to main content

PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks

  • Conference paper
  • First Online:
Ubiquitous Security (UbiSec 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1557))

Included in the following conference series:

Abstract

The security hazards in the digital sky of drones urges for lightweight and secure defense mechanisms against several cyber-attacks on drone networks. The main issues in a surveillance drone network are identification of valid drones, maintaining boundaries and information security along with physical security. To address these issues we are proposing a lightweight and secure drone-to-ground station and drone-to-drone mutual authentication protocol, PUFloc, using Physical unclonable functions (PUFs) and drone location data. PUFloc ensures attack resiliency and fail safe operation and uses only hash functions, XOR operations, PUF and random number generators. This is the first work that addresses physical security along with location validation of drones for mutually authenticating the drone with the ground station with minimum resource overheads and maximum security. Formal security analysis is done using random oracle model and ProVerif tool and informal security analysis also proves the resistance of our protocol against several possible attacks. FPGA implementation of the major cryptographic operations to estimate the power consumption and resource utilization show that the operations are lightweight to be implemented on drones. The analysis of performance and security and their comparison with existing works showcase the merit of PUFloc over other protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. What is Unmanned Aircraft Systems Traffic Management? https://www.faa.gov/uas/research_development/traffic_management/

  2. Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30580-4_6

    Chapter  MATH  Google Scholar 

  3. Ali, Z., Chaudhry, S.A., Ramzan, M.S., Al-Turjman, F.: Securing smart city surveillance: a lightweight authentication mechanism for unmanned vehicles. IEEE Access 8, 43711–43724 (2020)

    Article  Google Scholar 

  4. Alladi, T., Chamola, V., Kumar, N., et al.: PARTH: a two-stage lightweight mutual authentication protocol for UAV surveillance networks. Comput. Commun. 160, 81–90 (2020)

    Article  Google Scholar 

  5. Alladi, T., Naren, N., Bansal, G., Chamola, V., Guizani, M.: SecAuthUAV: a novel authentication scheme for UAV-base station scenario. IEEE Trans. Veh. Technol. 69, 15068–15077 (2020)

    Article  Google Scholar 

  6. Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: SPONGENT: the design space of lightweight cryptographic hashing. IEEE Trans. Comput. 62(10), 2041–2053 (2012)

    Article  MathSciNet  Google Scholar 

  7. Chang, C.C., Le, H.D.: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wireless Commun. 15(1), 357–366 (2015)

    Article  Google Scholar 

  8. Chen, C.L., Deng, Y.Y., Weng, W., Chen, C.H., Chiu, Y.J., Wu, C.M.: A traceable and privacy-preserving authentication for UAV communication control system. Electronics 9(1), 62 (2020)

    Article  Google Scholar 

  9. Cho, G., Cho, J., Hyun, S., Kim, H.: SENTINEL: a secure and efficient authentication framework for unmanned aerial vehicles. Appl. Sci. 10(9), 3149 (2020)

    Article  Google Scholar 

  10. Devi, M., Maakar, S.K., Sinwar, D., Jangid, M., Sangwan, P.: Applications of flying ad-hoc network during COVID-19 pandemic. In: IOP Conference Series: Materials Science and Engineering, vol. 1099, p. 012005. IOP Publishing (2021)

    Google Scholar 

  11. de la Fraga, L.G., Torres-Pérez, E., Tlelo-Cuautle, E., Mancillas-López, C.: Hardware implementation of pseudo-random number generators based on chaotic maps. Nonlinear Dyn. 90(3), 1661–1670 (2017). https://doi.org/10.1007/s11071-017-3755-z

    Article  Google Scholar 

  12. Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 15(9), 4957–4968 (2019)

    Article  Google Scholar 

  13. Gope, P., Millwood, O., Saxena, N.: A provably secure authentication scheme for RFID-enabled UAV applications. Comput. Commun. 166, 19–25 (2021)

    Article  Google Scholar 

  14. Gope, P., Sikdar, B.: An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Trans. Veh. Technol. 69(11), 13621–13630 (2020)

    Article  Google Scholar 

  15. Hassanalian, M., Abdelkefi, A.: Classifications, applications, and design challenges of drones: a review. Prog. Aerosp. Sci. 91, 99–131 (2017)

    Article  Google Scholar 

  16. He, S., Wu, Q., Liu, J., Hu, W., Qin, B., Li, Y.-N.: Secure communications in unmanned aerial vehicle network. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 601–620. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72359-4_37

    Chapter  Google Scholar 

  17. Hossain, M., Noor, S., Hasan, R.: HSC-IoT: a hardware and software co-verification based authentication scheme for internet of things. In: 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 109–116. IEEE (2017)

    Google Scholar 

  18. Huang, Z., Wang, Q.: A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 23(2), 1057–1088 (2020)

    Article  Google Scholar 

  19. Jaffal, R., Mohd, B.J., Al-Shayeji, M., et al.: An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster Comput. 24, 1–20 (2021)

    Article  Google Scholar 

  20. Jan, S.U., Qayum, F., Khan, H.U.: Design and analysis of lightweight authentication protocol for securing IoD. IEEE Access 9, 69287–69306 (2021)

    Article  Google Scholar 

  21. Jungk, B., Lima, L.R., Hiller, M.: A systematic study of lightweight hash functions on FPGAs. In: 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig 2014), pp. 1–6. IEEE (2014)

    Google Scholar 

  22. Lamothe, D.: U.S. and Britain hacked into feeds from Israeli drones and fighter jets, according to report (2015). https://www.washingtonpost.com/news/checkpoint/wp/2016/01/29/u-s-and-britain-hacked-into-feeds-from-israeli-drones-and-fighter-jets-according-to-report. Accessed 29 Jan 2016

  23. Lei, Y., Zeng, L., Li, Y.X., Wang, M.X., Qin, H.: A lightweight authentication protocol for UAV networks based on security and computational resource optimization. IEEE Access 9, 53769–53785 (2021)

    Article  Google Scholar 

  24. Li, S., Zhang, T., Yu, B., He, K.: A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT. IEEE Sens. J. 21, 5487–5501 (2020)

    Article  Google Scholar 

  25. Nikooghadam, M., Amintoosi, H., Islam, S.H., Moghadam, M.F.: A provably secure and lightweight authentication scheme for internet of drones for smart city surveillance. J. Syst. Architect. 115, 101955 (2021)

    Article  Google Scholar 

  26. Nyangaresi, V.O., Petrovic, N.: Efficient PUF based authentication protocol for internet of drones. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE (2021)

    Google Scholar 

  27. Pal, V., Acharya, B.S., Shrivastav, S., Saha, S., Joglekar, A., Amrutur, B.: PUF based secure framework for hardware and software security of drones. In: 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 01–06. IEEE (2020)

    Google Scholar 

  28. Porche, I.R.: Cyberwarfare Goes Wireless (2015). https://www.usnews.com/opinion/blogs/world-report/2014/04/04/russia-hacks-a-us-drone-in-crimea-as-cyberwarfare-has-gone-wireless. Accessed 4 April 2014

  29. Pu, C., Li, Y.: Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system. In: 2020 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), pp. 1–6. IEEE (2020)

    Google Scholar 

  30. Rodrigues, M., Amaro, J., Osório, F.S., Branco Kalinka, R.L.J.C.: Authentication methods for UAV communication. In: 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1210–1215. IEEE (2019)

    Google Scholar 

  31. Semal, B., Markantonakis, K., Akram, R.N.: A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), pp. 1–8. IEEE (2018)

    Google Scholar 

  32. Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.J.: TCALAS: temporal credential-based anonymous lightweight authentication scheme for internet of drones environment. IEEE Trans. Veh. Technol. 68(7), 6903–6916 (2019)

    Article  Google Scholar 

  33. Tanveer, M., Zahid, A.H., Ahmad, M., Baz, A., Alhakami, H.: LAKE-IoD: lightweight authenticated key exchange protocol for the internet of drone environment. IEEE Access 8, 155645–155659 (2020)

    Article  Google Scholar 

  34. Thompson, C.: Drug traffickers are hacking US surveillance drones to get past border patrol (2015). https://www.businessinsider.com/drug-traffickers-are-hacking-us-border-drones-2015-12?IR=T. Accessed 30 Dec 2015

  35. Tian, Y., Yuan, J., Song, H.: Efficient privacy-preserving authentication framework for edge-assisted internet of drones. J. Inf. Secur. Appl. 48, 102354 (2019)

    Google Scholar 

  36. Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V., Rodrigues, J.J.: Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet Things J. 6(2), 3572–3584 (2018)

    Article  Google Scholar 

  37. Won, J., Seo, S.H., Bertino, E.: Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 5, 3721–3749 (2017)

    Article  Google Scholar 

  38. Zhang, Y., He, D., Li, L., Chen, B.: A lightweight authentication and key agreement scheme for internet of drones. Comput. Commun. 154, 455–464 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aiswarya S. Nair .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nair, A.S., Thampi, S.M. (2022). PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds) Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol 1557. Springer, Singapore. https://doi.org/10.1007/978-981-19-0468-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0468-4_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0467-7

  • Online ISBN: 978-981-19-0468-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics