Formal Verification and Security Assessment of the Drone Remote Identification Protocol

被引:0
|
作者
Khan, Suleman [1 ]
Gaba, Gurjot Singh [1 ]
Boeira, Felipe [1 ]
Gurtov, Andrei [1 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, Linkoping, Sweden
关键词
Cybersecurity; DRIP; Formal verification; Tamarin; UAS; INTERNET;
D O I
10.1109/UVS59630.2024.10467159
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The worldwide implementation of Remote Identification (RID) regulations mandates unmanned aircraft systems (UAS), or drones, to openly transmit their identity and realtime location as plain text on the wireless channel. This mandate serves the purpose of accounting for and monitoring drone operations effectively. However, the current RID standard's plain-text transmission exposes it to cyberattacks, including eavesdropping, injection, and impersonation. The Drone Remote Identification Protocol (DRIP) has been proposed to enhance the security of RID. The DRIP ensures information secrecy and confidentiality by using unique session keys while guaranteeing the authenticity of messages and entities through digital signatures. These security features of DRIP make it a preferable alternative to the existing RID standard. However, the lack of verification regarding its security claims raises concerns about its performance in hostile conditions. This paper comprehensively analyzes the DRIP protocol's security features using Tamarin Prover, a formal security verification tool. With its automated reasoning capabilities, Tamarin Prover accurately identifies potential security vulnerabilities within the DRIP protocol while thoroughly verifying its conformance to security properties. Our investigation demonstrates that the DRIP protocol is susceptible to replay attacks. We strongly recommend the inclusion of message freshness components, reducing the lifespan of DET broadcasts, and incorporating a not-after timestamp that is set only a few minutes ahead of the current time. These measures enhance the protocol's defence against replay attacks and ensure message authenticity and integrity.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Abstractions for security protocol verification
    Binh Thanh Nguyen
    Sprenger, Christoph
    Cremers, Cas
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (04) : 459 - 508
  • [32] Abstractions for security protocol verification
    Nguyen, Binh Thanh
    Sprenger, Christoph
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 196 - 215
  • [33] Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices
    Jarosz, Michal
    Wrona, Konrad
    Zielinski, Zbigniew
    PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 617 - 625
  • [34] Automatic verification of security properties in remote internet voting protocol with applied Pi calculus
    Meng B.
    Huang W.
    Li Z.
    Wang D.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07)
  • [35] Formal Reasoning for Security Protocol Correctness
    Adi, Kamel
    Pene, Liviu
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 63 - +
  • [36] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [37] Formal Verification of Security Protocols: ProVerif and Extensions
    Yao, Jiangyuan
    Xu, Chunxiang
    Li, Deshun
    Lin, Shengjun
    Cao, Xingcan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 500 - 512
  • [38] Formal Security Verification of Industry 4.0 Applications
    Nigam, Vivek
    Talcott, Carolyn
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 1043 - 1050
  • [39] Formal Verification of the Security for Dual Connectivity in LTE
    Ben Henda, Noomene
    Norrman, Karl
    Pfeffer, Katharina
    2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING, 2015, : 13 - 19
  • [40] Formal Verification of Security Specifications with Common Criteria
    Morimoto, Shoichi
    Shigematsu, Shinjiro
    Goto, Yuichi
    Cheng, Jingde
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1506 - +