skip to main content
10.1145/3498361.3538941acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

G2Auth: secure mutual authentication for drone delivery without special user-side hardware

Published:27 June 2022Publication History

ABSTRACT

Because of its cost effectiveness and timeliness, package delivery using unmanned aerial vehicles (UAVs), called drone delivery, is drawing growing attention. Authentication is critical for ensuring that a package is not picked up by an attacker's drone or delivered to an attacker. As delivery drones are costly and may carry sensitive or expensive packages, a drone should not get very close to a person unless she is authenticated; thus, conventional authentication approaches that require human-drone physical contact do not work. Existing authentication methods for drone delivery suffer from one or multiple of the following limitations: (1) requiring special user-side hardware; (2) enforcing one-way authentication only; (3) being vulnerable to relay attacks; (4) having compatibility issues. We present the first system, named Greet-to-Auth (G2Auth, for short), that supports mutual authentication between a user and a drone, without these limitations. A user waves her hand holding a smartphone to conduct the authentication. The evaluation shows that it is secure, accurate, usable, and robust.

References

  1. Evan Ackerman and Michael Koziol. 2019. In the Air With Zipline's Medical Delivery Drones. https://spectrum.ieee.org/in-the-air-with-ziplines-medical-delivery-drones.Google ScholarGoogle Scholar
  2. Aytaç Altan and Rıfat Hacıoğlu. 2020. Model predictive control of three-axis gimbal system mounted on UAV for real-time target tracking under external disturbances. Mechanical Systems and Signal Processing 138 (2020).Google ScholarGoogle Scholar
  3. Amazon. 2020. Amazon Prime Air. https://www.amazon.com/Amazon-Prime-Air/b?ie=UTF8&node=8037720011.Google ScholarGoogle Scholar
  4. Apple. 2020. Getting Raw Accelerometer Events. https://developer.apple.com/documentation/coremotion/getting_raw_accelerometer_events.Google ScholarGoogle Scholar
  5. Pablo Arbelaez, Michael Maire, Charless Fowlkes, and Jitendra Malik. 2010. Contour detection and hierarchical image segmentation. IEEE transactions on pattern analysis and machine intelligence 33, 5 (2010).Google ScholarGoogle Scholar
  6. Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Čapkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, et al. 2018. Security of distance-bounding: A survey. ACM Computing Surveys (CSUR) 51, 5 (2018).Google ScholarGoogle Scholar
  7. Adeola Bannis, Hae Young Noh, and Pei Zhang. 2020. Bleep: motor-enabled audio side-channel for constrained UAVs. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jacob Benesty, Jingdong Chen, Yiteng Huang, and Israel Cohen. 2009. Pearson correlation coefficient. In Noise reduction in speech processing. Springer.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Goutam Bhat, Martin Danelljan, Luc Van Gool, and Radu Timofte. 2019. Learning discriminative model prediction for tracking. In Proceedings of the IEEE International Conference on Computer Vision (ICCV).Google ScholarGoogle ScholarCross RefCross Ref
  10. Stefan Brands and David Chaum. 1993. Distance-bounding protocols. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer.Google ScholarGoogle Scholar
  11. John Brooke. 1996. SUS: a 'quick and dirty' usability scale. Usability evaluation in industry (1996).Google ScholarGoogle Scholar
  12. Gerard Canal, Sergio Escalera, and Cecilio Angulo. 2016. A real-time humanrobot interaction system based on gestures for assistive scenarios. Computer Vision and Image Understanding 149 (2016).Google ScholarGoogle Scholar
  13. CBS News. 2020. Amazon delivery drones receive FAA approval. https://www.cbsnews.com/news/amazon-prime-air-delivery-drones-faa-approval/.Google ScholarGoogle Scholar
  14. Luke St Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger. 2006. Password exhaustion: Predicting the end of password usefulness. In International Conference on Information Systems Security. Springer.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Cas Cremers, Kasper B Rasmussen, Benedikt Schmidt, and Srdjan Capkun. 2012. Distance hijacking attacks on distance bounding protocols. In IEEE Symposium on Security and Privacy (S&P). IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Martin Danelljan, Goutam Bhat, Fahad Shahbaz Khan, and Michael Felsberg. 2019. Atom: Accurate tracking by overlap maximization. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  17. Martin Danelljan, Goutam Bhat, Fahad Shahbaz Khan, and Michael Felsberg. 2017. Eco: Efficient convolution operators for tracking. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  18. Martin Danelljan, Luc Van Gool, and Radu Timofte. 2020. Probabilistic regression for visual tracking. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  19. Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. 2010. Attacks on physical-layer identification. In Proceedings of the third ACM conference on Wireless network security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch me once and I know it's you!: Implicit Authentication based on Touch Screen Patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI).Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yvo Desmedt, Claude Goutier, and Samy Bengio. 1987. Special uses and abuses of the Fiat-Shamir passport protocol. In Conference on the Theory and Application of Cryptographic Techniques. Springer.Google ScholarGoogle Scholar
  22. DHL. 2019. DHL Express Launches Its First Regular Fully-automated and intelligent Urban Drone Delivery Service. https://www.dhl.com/tw-en/home/press/press-archive/2019/dhl-express-launches-its-first-regular-fully-automated-and-intelligent-urban-drone-delivery-service.html.Google ScholarGoogle Scholar
  23. DJI. 2019. User Manual for Mavic Mini. https://dl.djicdn.com/downloads/Mavic_Mini/Mavic_Mini_User_Manual_v1.0_en.pdf.Google ScholarGoogle Scholar
  24. Yinpeng Dong, Hang Su, Baoyuan Wu, Zhifeng Li, Wei Liu, Tong Zhang, and Jun Zhu. 2019. Efficient decision-based black-box adversarial attacks on face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Google ScholarGoogle ScholarCross RefCross Ref
  25. Saar Drimer, Steven J Murdoch, et al. 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.. In USENIX security symposium (USENIX Security).Google ScholarGoogle Scholar
  26. Dawei Du, Yuankai Qi, Hongyang Yu, Yifan Yang, Kaiwen Duan, Guorong Li, Weigang Zhang, Qingming Huang, and Qi Tian. 2018. The unmanned aerial vehicle benchmark: Object detection and tracking. In Proceedings of the European Conference on Computer Vision (ECCV).Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jeremy Elson, Lewis Girod, and Deborah Estrin. 2002. Fine-Grained Network Time Synchronization Using Reference Broadcasts. In 5th Symposium on Operating Systems Design and Implementation (OSDI).Google ScholarGoogle Scholar
  28. Thomas D Erickson, Kala K Fleming, Clifford A Pickover, and Komminist Weldemariam. 2018. Drone used for authentication and authorization for restricted access via an electronic lock. US Patent 9,875,592.Google ScholarGoogle Scholar
  29. Michael Esterman, Benjamin J Tamber-Rosenau, Yu-Chin Chiu, and Steven Yantis. 2010. Avoiding non-independence in fMRI data analysis: leave one subject out. Neuroimage 50, 2 (2010).Google ScholarGoogle Scholar
  30. Mohamed Amine Ferrag and Leandros Maglaras. 2019. DeliveryCoin: An IDS and blockchain-based delivery framework for drone-delivered services. Computers 8, 3 (2019).Google ScholarGoogle Scholar
  31. Sylvain Filiatrault and Ana-Maria Cretu. 2014. Human arm motion imitation by a humanoid robot. In 2014 IEEE International Symposium on Robotic and Sensors Environments (ROSE) Proceedings. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  32. Aurélien Francillon, Boris Danev, and Srdjan Capkun. 2011. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of the Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  33. Lishoy Francis, Gerhard P Hancke, Keith Mayes, and Konstantinos Markantonakis. 2011. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. IACR Cryptology ePrint Archive 2011 (2011).Google ScholarGoogle Scholar
  34. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2012. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2012).Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Davrondzhon Gafurov. 2007. A survey of biometric gait recognition: Approaches, security and challenges. In Annual Norwegian computer science conference. Annual Norwegian Computer Science Conference Norway.Google ScholarGoogle Scholar
  36. Davrondzhon Gafurov, Einar Snekkenes, and Patrick Bours. 2007. Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security 2, 3 (2007).Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Saurabh Ganeriwal, Ram Kumar, and Mani B Srivastava. 2003. Timing-sync protocol for sensor networks. In Proceedings of the 1st international conference on Embedded networked sensor systems.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Shriram Ganesh and Jose Roberto Menendez. 2016. Methods, systems and devices for delivery drone security. US Patent 9,359,074.Google ScholarGoogle Scholar
  39. Sinan Gezici, Zhi Tian, Georgios B Giannakis, Hisashi Kobayashi, Andreas F Molisch, H Vincent Poor, and Zafer Sahinoglu. 2005. Localization via ultrawideband radios: a look at positioning aspects for future sensor networks. IEEE signal processing magazine 22, 4 (2005).Google ScholarGoogle Scholar
  40. T. P. Ghuntla, H. B. Mehta, P. A. Gokhale, and C. J. Shah. 2012. A Comparative Study of Visual Reaction Time in Basketball Players and Healthy Controls. National Journal of Integrated Research in Medicine 3, 1 (2012).Google ScholarGoogle Scholar
  41. GPS.gov. 2015. GPS Accuracy. https://www.gps.gov/systems/gps/performance/accuracy/.Google ScholarGoogle Scholar
  42. Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, and Patrick Tague. 2017. Sensetribute: Smart Home Occupant Identification via Fusion Across On-Object Sensing Devices. In Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys).Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Gerhard P Hancke. 2005. A practical relay attack on ISO 14443 proximity cards. Technical report, University of Cambridge Computer Laboratory 59 (2005).Google ScholarGoogle Scholar
  44. Mark R. Hodges and Martha E. Pollack. 2007. An 'Object-Use Fingerprint': The Use of Electronic Sensors for Human Identification. In UbiComp.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Aditya Jain, Ramta Bansal, Avnish Kumar, and K. D. Singh. 2015. A comparative study of visual and auditory reaction times on the basis of gender and physical activity levels of medical first year students. International Journal of Applied & Basic Medical Research 5, 2 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  46. Kang Eun Jeon, James She, Perm Soonsawad, and Pai Chet Ng. 2018. Ble beacons for internet of things applications: Survey, challenges, and opportunities. IEEE Internet of Things Journal 5, 2 (2018).Google ScholarGoogle Scholar
  47. Ilchae Jung, Jeany Son, Mooyeol Baek, and Bohyung Han. 2018. Real-Time MDNet. In European Conference on Computer Vision (ECCV).Google ScholarGoogle Scholar
  48. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In 24th USENIX Security Symposium (USENIX Security).Google ScholarGoogle Scholar
  49. Andrew J Kerns, Daniel P Shepard, Jahshan A Bhatti, and Todd E Humphreys. 2014. Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics 31, 4 (2014).Google ScholarGoogle Scholar
  50. Felix Kreuk, Yossi Adi, Moustapha Cisse, and Joseph Keshet. 2018. Fooling end-to-end speaker verification with adversarial examples. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Marc Kuhn, Heinrich Luecken, and Nils Ole Tippenhauer. 2010. UWB impulse radio based distance bounding. In 2010 7th workshop on positioning, navigation and communication. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  52. Jennifer R Kwapisz, Gary M Weiss, and Samuel A Moore. 2011. Activity recognition using cell phone accelerometers. ACM SigKDD Explorations Newsletter 12, 2 (2011).Google ScholarGoogle Scholar
  53. Jianan Li, Xiaodan Liang, Yunchao Wei, Tingfa Xu, Jiashi Feng, and Shuicheng Yan. 2017. Perceptual generative adversarial networks for small object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  54. Xiaopeng Li, Sharaf Malebary, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, and Wenyuan Xu. 2018. iCare: Automatic and user-friendly child identification on smartphones. In Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications (HotMobile).Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, and Lannan Luo. 2019. Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices. In The 25th Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Xiaopeng Li, Qiang Zeng, Lannan Luo, and Tongbo Luo. 2020. T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices. In Proceedings of the ACM Conference on Computer & Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Lisa Johnston. 2020. What Are Webcam Frame Rates? https://www.lifewire.com/webcam-frame-rates-2640479.Google ScholarGoogle Scholar
  58. Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2018. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  59. Alan Lukezic, Tomas Vojir, Luka Cehovin Zajc, Jiri Matas, and Matej Kristan. 2017. Discriminative correlation filter with channel and spatial reliability. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  60. Shrirang Mare, Andrés Molina Markham, Cory Cornelius, Ronald Peterson, and David Kotz. 2014. Zebra: Zero-effort bilateral recurring authentication. In IEEE Symposium on Security and Privacy (S&P).Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. 2018. SAW: Wristband-based Authentication for Desktop Computers. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 3 (2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua. 2018. Distance-bounding protocols: Verification without time and location. In 2018 IEEE Symposium on Security and Privacy (S&P).Google ScholarGoogle ScholarCross RefCross Ref
  63. MavicPilot. 2018. Flying in Fog: Beware! https://mavicpilots.com/threads/flying-in-fog-beware.39412/.Google ScholarGoogle Scholar
  64. Daniel V. McGehee, Elizabeth N. Mazzae, and G. H. Scott Baldwin. 2000. Driver Reaction Time in Crash Avoidance Research: Validation of a Driving Simulator Study on a Test Track. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting.Google ScholarGoogle Scholar
  65. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In 23rd USENIX Security Symposium (USENIX Security).Google ScholarGoogle Scholar
  66. Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. 2009. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys & Tutorials 11, 4 (2009).Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Chandrashekar Natarajan, Donald R High, and V John J O'Brien. 2020. Unmanned aerial delivery to secure location. US Patent 10,592,843.Google ScholarGoogle Scholar
  68. Hildur Olafsdóttir, Aanjhan Ranganathan, and Srdjan Capkun. 2017. On the security of carrier phase-based ranging. In International Conference on Cryptographic Hardware and Embedded Systems. Springer.Google ScholarGoogle Scholar
  69. Payments-Next. 2019. Walmart drone delivery is up in the air. https://paymentsnext.com/walmart-drone-delivery-is-up-in-the-air/.Google ScholarGoogle Scholar
  70. Deepak Rajawat. 2022. 10 Best 90Hz and 120Hz Display Refresh Rate Phones To Buy In 2022. https://www.smartprix.com/bytes/best-90hz-120hz-refresh-rate-display-phones/.Google ScholarGoogle Scholar
  71. Soundarya Ramesh, Thomas Pathier, and Jun Han. 2019. SoundUAV: Towards Delivery Drone Authentication via Acoustic Noise Fingerprinting. In Proceedings of the 5th Workshop on Micro Aerial Vehicle Networks, Systems, and Applications.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Aanjhan Ranganathan and Srdjan Capkun. 2017. Are we really close? verifying proximity in wireless systems. IEEE Security & Privacy (S&P) (2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Juhi Ranjan and Kamin Whitehouse. 2015. Object Hallmarks: Identifying Object Users Using Wearable Wrist Sensors. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Kasper Bonne Rasmussen and Srdjan Capkun. 2010. Realization of RF Distance Bounding.. In USENIX Security Symposium (Usenix Security).Google ScholarGoogle Scholar
  75. Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018).Google ScholarGoogle Scholar
  76. Wu Ren, Bo Peng, Jiefen Shen, Yang Li, and Yi Yu. 2018. Study on vibration characteristics and human riding comfort of a special equipment cab. Journal of Sensors 2018 (2018).Google ScholarGoogle Scholar
  77. Research and Markets. 2018. Drone Logistics and Transportation Market by Solution (Warehousing, Shipping, Infrastructure, Software), Sector (Commercial, Military), Drone (Freight Drones, Passenger Drones, Ambulance Drones), and Region - Global Forecast to 2027. https://www.researchandmarkets.com/research/mmcvlf/29_06_billion?w=5.Google ScholarGoogle Scholar
  78. RobotoLab. 2020. NAO V6 price is $9000. https://www.robotlab.com/store/nao-power-v6-educator-pack.Google ScholarGoogle Scholar
  79. Napa Sae-Bae, Kowsar Ahmed, Katherine Isbister, and Nasir Memon. 2012. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI).Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Frederik Schaffalitzky. 2016. Human interaction with unmanned aerial vehicles. US Patent 9,459,620.Google ScholarGoogle Scholar
  81. Security Through Education. 2020. The social engineering framework: Delivery Person. https://www.social-engineer.org/framework/general-discussion/common-attacks/delivery-person/.Google ScholarGoogle Scholar
  82. Ivan W Selesnick and C Sidney Burrus. 1998. Generalized digital Butterworth filter design. IEEE Transactions on signal processing 46, 6 (1998).Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 acm sigsac conference on computer and communications security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Junjie Shen, Jun Yeon Won, Zeyuan Chen, and Qi Alfred Chen. 2020. Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing. In 29th USENIX Security Symposium (USENIX Security).Google ScholarGoogle Scholar
  85. Sheng Shen, Mahanth Gowda, and Romit Roy Choudhury. 2018. Closing the Gaps in Inertial Motion Tracking. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Sheng Shen, He Wang, and Romit Roy Choudhury. 2016. I Am a Smartwatch and I Can Track My User's Arm. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Daniel P Shepard, Jahshan A Bhatti, Todd E Humphreys, and Aaron A Fansler. 2012. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Radionavigation Laboratory Conference Proceedings.Google ScholarGoogle Scholar
  88. Brian Daniel Shucker and Brandon Kyle Trew. 2016. Machine-readable delivery platform for automated package delivery. US Patent 9,336,506.Google ScholarGoogle Scholar
  89. Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, and Joel JPC Rodrigues. 2019. TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment. IEEE Transactions on Vehicular Technology 68, 7 (2019).Google ScholarGoogle Scholar
  90. Shridatt Sugrim, Can Liu, Meghan McLean, and Janne Lindqvist. 2019. Robust Performance Metrics for Authentication Systems. In Network and Distributed Systems Security (NDSS) Symposium.Google ScholarGoogle Scholar
  91. Zhipeng Tang, Fabien Delattre, Pia Bideau, Mark D Corner, and Erik Learned-Miller. 2020. C-14: assured timestamps for drone videos. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking.Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Jing Tian, Chengzhang Qu, Wenyuan Xu, and Song Wang. 2013. KinWrite: Handwriting-Based Authentication Using Kinect. In Proceedings of the 20th Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  93. TripWire. 2017. Relay Attack against Keyless Vehicle Entry Systems Caught on Film. https://www.tripwire.com/state-of-security/security-awareness/relay-attack-keyless-vehicle-entry-systems-caught-film/.Google ScholarGoogle Scholar
  94. Sven Ubik and Jiří Pospíšilík. 2020. Video camera latency analysis and measurement. IEEE Transactions on Circuits and Systems for Video Technology 31, 1 (2020).Google ScholarGoogle Scholar
  95. Unmanned Systems Technology. 2020. Stabilizing Gimbals and Stabilized Camera Mounts for Drones and UAVs. https://www.unmannedsystemstechnology.com/company/gremsy/.Google ScholarGoogle Scholar
  96. UPS. 2020. UPS Flight Forward is changing the world of drone delivery. https://www.ups.com/us/en/services/shipping-services/flight-forward-drones.page.Google ScholarGoogle Scholar
  97. José Vila and Ricardo J. Rodríguez. 2015. Practical Experiences on NFC Relay Attacks with Android. In Radio Frequency Identification.Google ScholarGoogle Scholar
  98. Di Wen, Hu Han, and Anil K Jain. 2015. Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security 10, 4 (2015).Google ScholarGoogle Scholar
  99. Wired. 2017. Just a Pair of These $11 Radio Gadgets Can Steal a Car. https://www.wired.com/2017/04/just-pair-11-radio-gadgets-can-steal-car/.Google ScholarGoogle Scholar
  100. Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, and Bo Yuan. 2020. Real-time, universal, and robust adversarial attacks against speaker recognition systems. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).Google ScholarGoogle ScholarCross RefCross Ref
  101. Sangki Yun, Yi-Chao Chen, and Lili Qiu. 2015. Turning a Mobile Device into a Mouse in the Air. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Kexiong Curtis Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, and Yaling Yang. 2018. All your GPS are belong to us: Towards stealthy manipulation of road navigation systems. In 27th USENIX Security Symposium (USENIX Security).Google ScholarGoogle Scholar
  103. Peng Zhang, Fuhao Zou, Zhiwen Wu, Nengli Dai, Skarpness Mark, Michael Fu, Juan Zhao, and Kai Li. 2019. FeatherNets: Convolutional neural networks as light as feather for face anti-spoofing. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.Google ScholarGoogle ScholarCross RefCross Ref
  104. Shifeng Zhang, Xiaobo Wang, Ajian Liu, Chenxu Zhao, Jun Wan, Sergio Escalera, Hailin Shi, Zezheng Wang, and Stan Z Li. 2019. A dataset and benchmark for large-scale multi-modal face anti-spoofing. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  105. Pengfei Zhou, Mo Li, and Guobin Shen. 2014. Use It Free: Instantly Knowing Your Phone Attitude. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. G2Auth: secure mutual authentication for drone delivery without special user-side hardware

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiSys '22: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services
        June 2022
        668 pages
        ISBN:9781450391856
        DOI:10.1145/3498361

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 June 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate274of1,679submissions,16%

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader