PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks

被引:2
|
作者
Nair, Aiswarya S. [1 ,2 ]
Thampi, Sabu M. [3 ]
机构
[1] Indian Inst Informat Technol & Management Kerala, Trivandrum, Kerala, India
[2] Cochin Univ Sci & Techol CUSAT, Cochin, Kerala, India
[3] Kerala Univ Digital Sci Innovat & Technol KUDSIT, Technoc Campus, Trivandrum, Kerala, India
来源
UBIQUITOUS SECURITY | 2022年 / 1557卷
关键词
Drone authentication; PUF; Location validation; Impersonation; PUFloc; FPGA; KEY EXCHANGE PROTOCOL; LIGHTWEIGHT AUTHENTICATION; AGREEMENT SCHEME; PROVABLY SECURE; DESIGN; INTERNET;
D O I
10.1007/978-981-19-0468-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security hazards in the digital sky of drones urges for lightweight and secure defense mechanisms against several cyber-attacks on drone networks. The main issues in a surveillance drone network are identification of valid drones, maintaining boundaries and information security along with physical security. To address these issues we are proposing a lightweight and secure drone-to-ground station and drone-to-drone mutual authentication protocol, PUFloc, using Physical unclonable functions (PUFs) and drone location data. PUFloc ensures attack resiliency and fail safe operation and uses only hash functions, XOR operations, PUF and random number generators. This is the first work that addresses physical security along with location validation of drones for mutually authenticating the drone with the ground station with minimum resource overheads and maximum security. Formal security analysis is done using random oracle model and ProVerif tool and informal security analysis also proves the resistance of our protocol against several possible attacks. FPGA implementation of the major cryptographic operations to estimate the power consumption and resource utilization show that the operations are lightweight to be implemented on drones. The analysis of performance and security and their comparison with existing works showcase the merit of PUFloc over other protocols.
引用
收藏
页码:66 / 89
页数:24
相关论文
共 50 条
  • [41] Lightweight PUF-based Continuous Authentication Protocol
    Goutsos, Konstantinos
    Bystrov, Alex
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234
  • [42] A Lightweight Authentication Protocol for Network Security Based on PUF
    Xu, Zhao-Hui
    International Journal of Network Security, 2023, 25 (05) : 777 - 783
  • [43] A Double PUF-Based RFID Authentication Protocol
    Li T.
    Liu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
  • [44] Qubits based mutual authentication protocol
    Nema, Prashant
    Nene, Manisha J.
    SECURITY AND PRIVACY, 2022, 5 (03)
  • [45] Provably Secure PUF-Based Lightweight Mutual Authentication Scheme for Wireless Body Area Networks
    Lee, SangCheol
    Kim, SuHwan
    Yu, SungJin
    Jho, NamSu
    Park, YoHan
    ELECTRONICS, 2022, 11 (23)
  • [46] Mutual Authentication Protocols Based on PUF and Multitrusted Authority for Internet of Vehicles
    Yang, Yuting
    Tan, Weijie
    Li, Zhen
    Chen, Yuling
    Li, Chunguo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40086 - 40099
  • [47] A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location
    Lu, Zhi
    Dou, Haochen
    Lu, Songfeng
    Tang, Xueming
    Wu, Junjun
    Umran, Samir Mohammed
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 63 - 78
  • [48] A New Efficient PUF-Based Mutual Authentication Scheme for Drones
    Ayebie, Edoukou Berenger
    Bou-chaaya, Karam
    Rais, Helmi
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 67 - 84
  • [49] SRAM-PUF Based Lightweight Mutual Authentication Scheme for IoT
    Zhu, Yongqing
    Guan, Zhenyu
    Wang, Ziyi
    Li, Dawei
    Wang, Yawei
    Xu, Mai
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 806 - 813
  • [50] Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure
    Nesteruk, Sergey
    Bezzateev, Sergey
    PROCEEDINGS OF THE 2018 22ND CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2018, : 190 - 197