Formal Verification and Security Assessment of the Drone Remote Identification Protocol

被引:0
|
作者
Khan, Suleman [1 ]
Gaba, Gurjot Singh [1 ]
Boeira, Felipe [1 ]
Gurtov, Andrei [1 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, Linkoping, Sweden
关键词
Cybersecurity; DRIP; Formal verification; Tamarin; UAS; INTERNET;
D O I
10.1109/UVS59630.2024.10467159
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The worldwide implementation of Remote Identification (RID) regulations mandates unmanned aircraft systems (UAS), or drones, to openly transmit their identity and realtime location as plain text on the wireless channel. This mandate serves the purpose of accounting for and monitoring drone operations effectively. However, the current RID standard's plain-text transmission exposes it to cyberattacks, including eavesdropping, injection, and impersonation. The Drone Remote Identification Protocol (DRIP) has been proposed to enhance the security of RID. The DRIP ensures information secrecy and confidentiality by using unique session keys while guaranteeing the authenticity of messages and entities through digital signatures. These security features of DRIP make it a preferable alternative to the existing RID standard. However, the lack of verification regarding its security claims raises concerns about its performance in hostile conditions. This paper comprehensively analyzes the DRIP protocol's security features using Tamarin Prover, a formal security verification tool. With its automated reasoning capabilities, Tamarin Prover accurately identifies potential security vulnerabilities within the DRIP protocol while thoroughly verifying its conformance to security properties. Our investigation demonstrates that the DRIP protocol is susceptible to replay attacks. We strongly recommend the inclusion of message freshness components, reducing the lifespan of DET broadcasts, and incorporating a not-after timestamp that is set only a few minutes ahead of the current time. These measures enhance the protocol's defence against replay attacks and ensure message authenticity and integrity.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [2] Formal Security Assessment of Modbus Protocol
    Nardone, Roberto
    Rodriguez, Ricardo J.
    Marrone, Stefano
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 142 - 147
  • [3] ORION: Verification of drone trajectories via remote identification messages
    Sciancalepore, Savio
    Davidovic, Filip
    Oligeri, Gabriele
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 160 : 869 - 878
  • [4] A Study of Process Calculus for Formal Verification and Analysis of Security Protocol
    Irfan, Annie
    Gaur, Manish
    Tripathi, Surya Prakash
    PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018), 2018, : 119 - 124
  • [5] Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther
    Mohammad, Zeyad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (09)
  • [6] Short Paper: Formal Verification of an Authorization Protocol for Remote Vehicle Diagnostics
    Kleberger, Pierre
    Moulin, Guilhem
    2013 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2013, : 202 - 205
  • [7] Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
    Patel, Reema
    Borisaniya, Bhavesh
    Patel, Avi
    Patel, Dhiren
    Rajarajan, Muttukrishnan
    Zisman, Andrea
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 152 - +
  • [8] Formal verification of the IEEE 802.11i WLAN security protocol
    Sithirasenan, Elankayer
    Zafar, Saad
    Muthukkumarasamy, Vallipuram
    2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 181 - +
  • [9] Formal Property Verification of a Remote Memory Access Protocol IP-Core
    Borchers, Kai
    Firchau, Thomas
    2022 IEEE AEROSPACE CONFERENCE (AERO), 2022,
  • [10] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,