Font Size: a A A

Research On Security Authentication In UAV Ad Hoc Networks

Posted on:2024-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q S ZhuFull Text:PDF
GTID:2542307136995819Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The popularity of Unmanned Aerial Vehicles(UAVs)has significantly increased in recent years,particularly in academia and the military.Drones are commonly used to collect sensitive data for various applications,such as monitoring critical infrastructure,crops,and public safety.However,as UAVs operate in an open environment and communicate through wireless transmission,they are susceptible to various attacks,including message tampering,replay attacks,and physical capture attacks.Due to the sensitivity and privacy of the data collected by drones,privacy protection in the Internet of Drones(Io D)is crucial.Furthermore,UAV swarm networks face issues related to massive data transmission and poor computing efficiency.As a result,reducing computing and communication overhead while implementing stringent authentication mechanisms in the UAV network has become a significant area of research.Accordingly,this paper focuses on designing two authentication schemes in the UAV Internet scenario,with the following being the primary objectives of the study:(1)This paper proposes a lightweight identity authentication and key agreement scheme for drones based on Physically Unclonable Functions(PUF),which achieves high efficiency using only basic XOR and hash operations for authentication and negotiation communication.The scheme uses pseudonyms to protect the privacy of drone identities,while also enabling Ground Station(GS)to trace their real identity in the event of false information or legal violations.By utilizing the properties of PUF,the scheme makes UAVs resistant to camouflage attacks and physical attacks.Moreover,the scheme generates three session keys in a single session,thereby improving the efficiency of key negotiation.The security analysis of the scheme demonstrates that it meets various security requirements,such as mutual authentication,key agreement,unlinkability,and forward-backward security,and utilizes Mao Boyd logic to rigorously prove the security of the key.Additionally,the scheme’s lightweight computing operations make it advantageous over existing UAV authentication negotiation schemes in terms of computing and communication overhead,as demonstrated through performance analysis.(2)This paper also proposes a certificate-less anonymous batch authentication scheme for drone swarms that utilizes aggregated signature technology.The Ground Service Center(GSC)performs an aggregated verification of different messages from various drones,significantly reducing computing costs and verification time.The scheme eliminates complicated certificate management and key escrow problems by avoiding the use of certificates.Additionally,it provides a two-layer error signature location method that can rapidly identify error signatures in case of failed aggregate signature authentication.Under the assumption that the Elliptic Curve Discrete Logarithm Problem(ECDLP)is established,the security and unforgeability of the scheme are proven in the random oracle model.As a result,the proposed scheme can prevent malicious UAVs from compromising the security features of the UAV Internet.Based on elliptic curve cryptography,the proposed batch authentication scheme has higher efficiency in computing and communication overhead than existing UAV batch authentication schemes,as demonstrated through performance analysis and comparison.
Keywords/Search Tags:Internet of Drones, Lightweight, PUF, Identity Authentication, Aggregate Signature
PDF Full Text Request
Related items