UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks

Emerging surveillance applications of UAV teams rely on secure communication to exchange information, coordinate their movements, and fulfill mission objectives. Protecting the network by identifying malicious nodes that are trying to disturb the system is an important task, particularly in the military domain. This paper presents the design and evaluation of UAVouch, an identity and location validation scheme that combines a public-key based authentication mechanism with a movement plausibility check for groups of UAVs. The key idea of UAVouch is to supplement the authentication mechanism by periodically checking the plausibility of the locations of neighboring UAVs, allowing the detection of intruders that are unable to follow expected trajectories. The proposed solution was evaluated in a simulated military surveillance scenario in which it detected malicious nodes’ position falsification attacks with an average accuracy of above 85%.

[1]  Carlisle M. Adams Impersonation Attack , 2011, Encyclopedia of Cryptography and Security.

[2]  Zeeshan Ali,et al.  Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles , 2020, IEEE Access.

[3]  Miguel L. Pardal,et al.  Witness-Based Location Proofs for Mobile Devices , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).

[4]  Prasant Mohapatra,et al.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users , 2016, IEEE/ACM Transactions on Networking.

[5]  Mauro Conti,et al.  A New Secure Data Dissemination Model in Internet of Drones , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[6]  Kim-Kwang Raymond Choo,et al.  Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.

[7]  George Loukas,et al.  A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles , 2019, Ad Hoc Networks.

[8]  Gaurav Raj,et al.  Surveillance drone for disaster management and military security , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[9]  Mikael Asplund,et al.  Vouch: A Secure Proof-of-Location Scheme for VANETs , 2018, MSWiM.

[10]  Michail Maniatakos,et al.  Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.

[11]  Mikael Asplund,et al.  Decentralized proof of location in vehicular Ad Hoc networks , 2019, Comput. Commun..

[12]  Prakash Ranganathan,et al.  Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs) , 2019, 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[13]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[14]  Edison Pignaton de Freitas,et al.  Employing SDN to control video streaming applications in military mobile networks , 2017, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA).

[15]  K. Anuradha,et al.  Enabling Privacy-Preserving Location Proofs for Mobile Users , 2018 .

[16]  Mohsen Guizani,et al.  Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions , 2018, IEEE Communications Surveys & Tutorials.

[17]  Mohsen Guizani,et al.  Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges , 2018, IEEE Access.

[18]  Wisnu Jatmiko,et al.  Intruder Drone Localization Based on 2D Image and Area Expansion Principle for Supporting Military Defence System , 2019, 2019 IEEE International Conference on Communication, Networks and Satellite (Comnetsat).

[19]  Peter Han Joo Chong,et al.  An expedite group key establishment protocol for Flying Ad-Hoc Network(FANET) , 2016, 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV).

[20]  Ashish Khanna,et al.  APD-JFAD: Accurate Prevention and Detection of Jelly Fish Attack in MANET , 2018, IEEE Access.

[21]  Marisol Gutierrez,et al.  Use of Drones for Surveillance and Reconnaissance of Military Areas , 2018 .

[22]  Edison Pignaton de Freitas,et al.  Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning , 2017, 2017 IEEE Vehicular Networking Conference (VNC).

[23]  Ajay Kaul,et al.  A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..

[24]  Muttukrishnan Rajarajan,et al.  Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain , 2019, Ad Hoc Networks.

[25]  Vinay Bhatia,et al.  Detection Of Malicious Nodes in Flying Ad-HOC Networks (FANET) , 2018 .

[26]  Aakanksha Chowdhery,et al.  Model Predictive Compression for Drone Video Analytics , 2018, 2018 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops).

[27]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[28]  Eduardo Castelló Ferrer The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.

[29]  Yong Xiang,et al.  SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[30]  Mahbub Hassan,et al.  Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges , 2018, IEEE Communications Surveys & Tutorials.

[31]  Pascal Lorenz,et al.  Routing in Flying Ad Hoc Networks: Survey, Constraints, and Future Challenge Perspectives , 2019, IEEE Access.

[32]  Bart Engberts,et al.  Policing from Above: Drone Use by the Police , 2016 .

[33]  Abolfazl Razi,et al.  A unified framework for joint mobility prediction and object profiling of drones in UAV networks , 2018, Journal of Communications and Networks.

[34]  Joel J. P. C. Rodrigues,et al.  TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.

[35]  Frank Eliassen,et al.  Self-Organization as a Supporting Paradigm for Military UAV Relay Networks , 2016, IEEE Communications Letters.

[36]  Fernando Santos Osório,et al.  Authentication Methods for UAV Communication , 2019, 2019 IEEE Symposium on Computers and Communications (ISCC).

[37]  Mohammed Atiquzzaman,et al.  On the routing in Flying Ad Hoc Networks , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).