PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks

Abstract UAVs are being widely deployed in security and surveillance applications around the world. Due to deployment in remote environments and also due to limited resources on these devices, they are susceptible to device capture and physical tampering attacks. This heightens the risk of sensitive data stored in the UAVs to be captured by adversaries. To address this issue, a two-stage lightweight mutual authentication protocol is presented in this paper, well suited to SDN-backed multi UAV networks deployed in surveillance areas. Formal security proof of the protocol is presented to highlight its security features. We also compare our protocol with other state-of-the-art works in terms of computation latency and resilience against known security attacks.

[1]  Neeraj Kumar,et al.  CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment , 2020, IEEE Internet of Things Journal.

[2]  You Ze Cho,et al.  Positioning of UAVs for throughput maximization in software-defined disaster area UAV communication networks , 2018, Journal of Communications and Networks.

[3]  Awais Ahmad,et al.  Hierarchical architecture for 5G based software-defined intelligent transportation system , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[4]  Sadia Din,et al.  5G-enabled Hierarchical architecture for software-defined intelligent transportation system , 2019, Comput. Networks.

[5]  Athanasios V. Vasilakos,et al.  Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment , 2019, IEEE Internet of Things Journal.

[6]  Mohsen Guizani,et al.  Applications of blockchain in unmanned aerial vehicles: A review , 2020, Veh. Commun..

[7]  Biplab Sikdar,et al.  Consumer IoT: Security Vulnerability Case Studies and Solutions , 2020, IEEE Consumer Electronics Magazine.

[8]  Vikas Hassija,et al.  Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory , 2020, Comput. Commun..

[9]  Aijing Li,et al.  An SDN-MQTT Based Communication System for Battlefield UAV Swarms , 2019, IEEE Communications Magazine.

[10]  Aníbal Ollero,et al.  Journal of Intelligent & Robotic Systems manuscript No. (will be inserted by the editor) Experimental Results in Multi-UAV Coordination for Disaster Management and Civil Security Applications , 2022 .

[11]  Frans M. J. Willems,et al.  Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes , 2019, IEEE Internet of Things Journal.

[12]  Konstantinos Markantonakis,et al.  A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks , 2018, 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC).

[13]  Yousung Kang,et al.  Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security , 2019, IEEE Internet of Things Journal.

[14]  Kim-Kwang Raymond Choo,et al.  Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.

[15]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[16]  Mohsen Guizani,et al.  Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function , 2020, IEEE Transactions on Vehicular Technology.

[17]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[18]  Agathoniki Trigoni,et al.  Supporting Search and Rescue Operations with UAVs , 2010, 2010 International Conference on Emerging Security Technologies.

[19]  Gurkan Tuna,et al.  Unmanned aerial vehicle-aided communications system for disaster recovery , 2014, J. Netw. Comput. Appl..

[20]  Ulrich Rührmair,et al.  The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[21]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[22]  Colin Boyd,et al.  Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.

[23]  Kim-Kwang Raymond Choo,et al.  Blockchain Applications for Industry 4.0 and Industrial IoT: A Review , 2019, IEEE Access.

[24]  Evsen Yanmaz,et al.  Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint , 2016, IEEE Communications Surveys & Tutorials.

[25]  Marcello Chiaberge,et al.  Multipurpose UAV for search and rescue operations in mountain avalanche events , 2017 .

[26]  Joel J. P. C. Rodrigues,et al.  TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.

[27]  Ilsun You,et al.  Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs , 2017, IEEE Network.

[28]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[29]  Jeremiah Gertler,et al.  Homeland Security: Unmanned Aerial Vehicles and Border Surveillance , 2010 .

[30]  Bernhard Rinner,et al.  Incremental Mosaicking of Images from Autonomous, Small-Scale UAVs , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[31]  Awais Ahmad,et al.  Real-Time Route Planning and Data Dissemination for Urban Scenarios Using the Internet of Things , 2019, IEEE Wireless Communications.

[32]  Jorge Guajardo,et al.  Brand and IP protection with physical unclonable functions , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[33]  Suhas N. Diggavi,et al.  Design and Analysis of Stability-Guaranteed PUFs , 2018, IEEE Transactions on Information Forensics and Security.

[34]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[35]  R. B. Patel,et al.  Capacity and interference aware link scheduling with channel assignment in wireless mesh networks , 2011, J. Netw. Comput. Appl..

[36]  Nirwan Ansari,et al.  An optimal delay aware task assignment scheme for wireless SDN networked edge cloudlets , 2020, Future Gener. Comput. Syst..

[37]  Tarik Taleb,et al.  UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.

[38]  Vinay Chamola,et al.  HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks , 2021, IEEE Journal on Selected Areas in Communications.

[39]  Kim-Kwang Raymond Choo,et al.  Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.

[40]  Weisi Guo,et al.  Relay Deployment in Cellular Networks: Planning and Optimization , 2013, IEEE Journal on Selected Areas in Communications.