Formal Verification and Security Assessment of the Drone Remote Identification Protocol

被引:0
|
作者
Khan, Suleman [1 ]
Gaba, Gurjot Singh [1 ]
Boeira, Felipe [1 ]
Gurtov, Andrei [1 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, Linkoping, Sweden
关键词
Cybersecurity; DRIP; Formal verification; Tamarin; UAS; INTERNET;
D O I
10.1109/UVS59630.2024.10467159
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The worldwide implementation of Remote Identification (RID) regulations mandates unmanned aircraft systems (UAS), or drones, to openly transmit their identity and realtime location as plain text on the wireless channel. This mandate serves the purpose of accounting for and monitoring drone operations effectively. However, the current RID standard's plain-text transmission exposes it to cyberattacks, including eavesdropping, injection, and impersonation. The Drone Remote Identification Protocol (DRIP) has been proposed to enhance the security of RID. The DRIP ensures information secrecy and confidentiality by using unique session keys while guaranteeing the authenticity of messages and entities through digital signatures. These security features of DRIP make it a preferable alternative to the existing RID standard. However, the lack of verification regarding its security claims raises concerns about its performance in hostile conditions. This paper comprehensively analyzes the DRIP protocol's security features using Tamarin Prover, a formal security verification tool. With its automated reasoning capabilities, Tamarin Prover accurately identifies potential security vulnerabilities within the DRIP protocol while thoroughly verifying its conformance to security properties. Our investigation demonstrates that the DRIP protocol is susceptible to replay attacks. We strongly recommend the inclusion of message freshness components, reducing the lifespan of DET broadcasts, and incorporating a not-after timestamp that is set only a few minutes ahead of the current time. These measures enhance the protocol's defence against replay attacks and ensure message authenticity and integrity.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Formal Specification and Verification of Security Guidelines
    Zhioua, Zeineb
    Roudier, Yves
    Ameur, Rabea Boulifa
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
  • [22] Formal Verification and Security Analysis of AMQP
    Liu, Huiying
    Dong, Wenting
    Zhu, Huibiao
    Su, Ziqing
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2177 - 2182
  • [23] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [24] Formal Verification and Visualization of Security Policies
    Wahsheh, Luay A.
    de Leon, Daniel Conte
    Alves-Foss, Jim
    JOURNAL OF COMPUTERS, 2008, 3 (06) : 22 - 31
  • [25] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [26] Formal specification and verification of a micropayment protocol
    Gouda, MG
    Liu, AX
    ICCCN 2004: 13TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2004, : 489 - 494
  • [27] Modelling and Formal Verification of the NEO Protocol
    Choppy, Christine
    Dedova, Anna
    Evangelista, Sami
    Klai, Kais
    Petrucci, Laure
    Youcef, Samir
    TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY VI, 2012, 7400 : 197 - 225
  • [28] Applying formal verification with protocol compiler
    Stangier, C
    Holtmann, U
    EUROMICRO SYMPOSIUM ON DIGITAL SYSTEMS DESIGN, PROCEEDINGS, 2001, : 165 - 169
  • [29] FORMAL TECHNIQUES FOR PROTOCOL SPECIFICATION AND VERIFICATION
    SUNSHINE, C
    COMPUTER, 1979, 12 (09) : 20 - 27
  • [30] Efficient Remote Identification for Drone Swarms
    Seo, Kang-Moon
    Kim, Jane
    Lee, Soojin
    Kwon, Jun-Woo
    Seo, Seung-Hyun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 2937 - 2958