Drone Authentication Using ID-Based Signcryption in LoRaWAN Network

The security of the Internet of Things (IoT) is now at the embryonic stage. In fact, unrelenting innovation has slowed down the implementation of security and made user privacy an easy target. Through this work, we propose a secure architecture dedicated to an IoT-based drone in a LoRa context. For this purpose, we focused on the drone’s authentication process by deploying an Id-Based Signcryption method and temporary identities.

[1]  Tarik Taleb,et al.  Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.

[2]  W. Gregory Voss Privacy law implications of the use of drones for security and justice purposes , 2013 .

[3]  Ilsun You,et al.  An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System , 2018, Sensors.

[4]  Vitor Guizilini,et al.  The Impact of DoS Attacks on the AR.Drone 2.0 , 2016, 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR).

[5]  Stefano Secci,et al.  A tutorial on blockchain and applications to secure network control-planes , 2016, 2016 3rd Smart Cloud Networks & Systems (SCNS).

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  Daejun Park,et al.  Security Authentication System Using Encrypted Channel on UAV Network , 2017, 2017 First IEEE International Conference on Robotic Computing (IRC).

[8]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[9]  Vinod Kumar Chaubey,et al.  GPS signal jamming and anti-jamming strategy — A theoretical analysis , 2016 .

[10]  Elisa Bertino,et al.  MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[11]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[12]  Aiko Pras,et al.  Exploring security vulnerabilities of unmanned aerial vehicles , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[13]  Kwangjo Kim,et al.  Wireless Authentication Protocol Preserving User Anonymity , 2001 .

[14]  Emiliano Sisinni,et al.  Evaluation of the IoT LoRaWAN Solution for Distributed Measurement Applications , 2017, IEEE Transactions on Instrumentation and Measurement.

[15]  Bin Cao,et al.  Securing commercial WiFi-based UAVs from common security attacks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[16]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..