Formal Verification and Security Assessment of the Drone Remote Identification Protocol

被引:0
|
作者
Khan, Suleman [1 ]
Gaba, Gurjot Singh [1 ]
Boeira, Felipe [1 ]
Gurtov, Andrei [1 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, Linkoping, Sweden
关键词
Cybersecurity; DRIP; Formal verification; Tamarin; UAS; INTERNET;
D O I
10.1109/UVS59630.2024.10467159
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The worldwide implementation of Remote Identification (RID) regulations mandates unmanned aircraft systems (UAS), or drones, to openly transmit their identity and realtime location as plain text on the wireless channel. This mandate serves the purpose of accounting for and monitoring drone operations effectively. However, the current RID standard's plain-text transmission exposes it to cyberattacks, including eavesdropping, injection, and impersonation. The Drone Remote Identification Protocol (DRIP) has been proposed to enhance the security of RID. The DRIP ensures information secrecy and confidentiality by using unique session keys while guaranteeing the authenticity of messages and entities through digital signatures. These security features of DRIP make it a preferable alternative to the existing RID standard. However, the lack of verification regarding its security claims raises concerns about its performance in hostile conditions. This paper comprehensively analyzes the DRIP protocol's security features using Tamarin Prover, a formal security verification tool. With its automated reasoning capabilities, Tamarin Prover accurately identifies potential security vulnerabilities within the DRIP protocol while thoroughly verifying its conformance to security properties. Our investigation demonstrates that the DRIP protocol is susceptible to replay attacks. We strongly recommend the inclusion of message freshness components, reducing the lifespan of DET broadcasts, and incorporating a not-after timestamp that is set only a few minutes ahead of the current time. These measures enhance the protocol's defence against replay attacks and ensure message authenticity and integrity.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [42] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [43] Formal Verification on Distributed Spectrum Sensing Protocol
    Liu, Jin-bo
    Liao, Ming-xue
    Hu, Xiao-hui
    He, Xiao-xin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 190 - 194
  • [44] Formal Verification Technology for Asynchronous Communication Protocol
    Hu, Yayun
    Li, Dongfang
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 482 - 486
  • [45] Formal Verification for KMB09 Protocol
    Guiping Dai
    International Journal of Theoretical Physics, 2019, 58 : 3651 - 3657
  • [46] Formal Modeling and Verification of Rumor Routing Protocol
    Yasin, Daniyal
    Saghar, Kashif
    Younis, Shahzad
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 318 - 323
  • [47] A TERMINATION DETECTION PROTOCOL AND ITS FORMAL VERIFICATION
    ERIKSEN, O
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1988, 5 (01) : 82 - 91
  • [48] Formal Verification for KMB09 Protocol
    Dai, Guiping
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (11) : 3651 - 3657
  • [49] Enhanced Mobile SET Protocol with Formal Verification
    Ahamad, Shaik Shakeel
    Sastry, V. N.
    Udgata, Siba K.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT), 2012, : 288 - 293
  • [50] Formal Verification of a Grid Resource Allocation Protocol
    Dalheimer, Mathias
    Pfreundt, Franz-Josef
    Merz, Peter
    CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 332 - +