An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems

In network-connected UAV (NC-UAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation (DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication (MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module (TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host. The entire scheme and protocols are presented, and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed. Our experiment results also confirm the high efficiency of the proposed scheme.

[1]  Liqun Chen,et al.  On the Design and Implementation of an Efficient DAA Scheme , 2010, IACR Cryptol. ePrint Arch..

[2]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[3]  Liqun Chen,et al.  Pairings in Trusted Computing , 2008, Pairing.

[4]  Alfred Menezes,et al.  Pairing-Based Cryptography at High Security Levels , 2005, IMACC.

[5]  Christian Wietfeld,et al.  Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations , 2011 .

[6]  Jianfeng Ma,et al.  Multi-domain Direct Anonymous Attestation Scheme from Pairings , 2014, NSS.

[7]  Nigel P. Smart,et al.  On Computing Products of Pairings , 2006, IACR Cryptol. ePrint Arch..

[8]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[9]  Calvin Coopmans,et al.  Improving communication security of open source UAVs: Encrypting radio control link , 2017, 2017 International Conference on Unmanned Aircraft Systems (ICUAS).

[10]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[11]  Jiangtao Li,et al.  Simplified security notions of direct anonymous attestation and a concrete scheme from pairings , 2009, International Journal of Information Security.

[12]  Stephen Oakes,et al.  Security Testing of an Unmanned Aerial Vehicle (UAV) , 2016, 2016 Cybersecurity Symposium (CYBERSEC).

[13]  Heiko Stamer,et al.  A Software-Based Trusted Platform Module Emulator , 2008, TRUST.

[14]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[15]  Jan Camenisch,et al.  Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.

[16]  Xiaofeng Chen,et al.  Direct Anonymous Attestation for Next Generation TPM , 2008, J. Comput..

[17]  Mohsen Guizani,et al.  Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.

[18]  Ernest F. Brickell,et al.  Direct anonymous attestation , 2004, CCS '04.

[19]  Mingtian Zhou,et al.  A new process and framework for direct anonymous attestation based on symmetric bilinear maps , 2011, Wuhan University Journal of Natural Sciences.

[20]  Liqun Chen,et al.  A DAA Scheme Using Batch Proof and Verification , 2010, TRUST.

[21]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.