Authentication Methods for UAV Communication

Unmanned Aerial Systems (UASs) are being employed in many different applications, and with the increased usage security concerns become more accentuated. Communication links are core components of a UAS, and providing a secure communication channel is a necessity in which Authentication strategies play a major role. However, resource-constrained devices cannot adopt off-the-shelf security strategies that were not developed taking into account those devices’ constraints. Because of that, new security strategies, including authentication, were purposed for these applications. In this paper, we analyze and compare two authentication protocols developed for WSNs and modified for UAV usage. Tests were performed analyzing time execution and CPU usage on security-specific operation such as hash tables and elliptic curve operations.

[1]  Min Xiao,et al.  An Efficient V2I Authentication Scheme for VANETs , 2018, Mob. Inf. Syst..

[2]  Ming Lim,et al.  An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems , 2018, China Communications.

[3]  Jianfeng Ma,et al.  A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks , 2017, Int. J. Netw. Manag..

[4]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[5]  Victor C. M. Leung,et al.  Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.

[6]  AltawyRiham,et al.  Security, Privacy, and Safety Aspects of Civilian Drones , 2016 .

[7]  Daejun Park,et al.  Security Authentication System Using Encrypted Channel on UAV Network , 2017, 2017 First IEEE International Conference on Robotic Computing (IRC).

[8]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[9]  Dindayal Mahto,et al.  Performance Analysis of RSA and Elliptic Curve Cryptography , 2018, Int. J. Netw. Secur..

[10]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[11]  Diana Bohm,et al.  Computer And Information Security Handbook , 2016 .

[12]  Ahmed Serhrouchni,et al.  A Survey of Internet of Things (IoT) Authentication Schemes † , 2019, Sensors.

[13]  Saru Kumari,et al.  An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.

[14]  Tarik Taleb,et al.  Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.

[15]  Quynh Dang,et al.  Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard , 2013, Cryptologia.

[16]  Sidi-Mohammed Senouci,et al.  Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution , 2018, The Journal of Supercomputing.

[17]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[18]  Ouajdi Korbaa,et al.  Privacy Preservation and Drone Authentication Using ID-Based Signcryption , 2018, SoMeT.

[19]  Mohsen Guizani,et al.  Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.

[20]  Mohammad Hesam Tadayon,et al.  A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.