A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions
Abstract
:1. Introduction
- 1.
- A novel secure protocol is proposed that can be used to mutually authenticate a UAV and the ground station. Moreover, it can be used to establish a secure session between the UAV drones and the ground station.
- 2.
- The protocol can be modified to establish a secure communication session between any two devices on the network of UAVs.
- 3.
- A formal security proof is provided to establish that the proposed protocol is safe and secure for the network of UAVs.
- 4.
- A performance comparison between state-of-the-art protocols and the proposed protocols shows that the latter is resource- and power-efficient, and simultaneously achieves the objectives of securing the network nodes and its communication.
2. Related Work
3. Preliminary Background
4. System Model
4.1. Threat Models
4.2. Security Objectives
- Secure mutual authentication between the individual UAV devices and the central ground station.
- Resilience to the common attacks such as man-in-the-middle attacks, replay attacks, eavesdropping, etc.
- Generation of secret session key each time a new session is established between a UAV and the ground station.
- Ability to detect and reject captured, tampered, or cloned UAV devices by the adversary.
- Anonymous operation ensured by the use of temporary pseudo-identities for each session established between the UAV and the central station.
5. Proposed Authentication Approach
5.1. Registration Phase
5.2. Authentication Phase
- 1.
- Initiate Request: Either a UAV or the ground station G can initiate the request for mutual authentication process by sending a message to the other device. In the case of the ground station initiating the authentication process, the request message is sent along with a message digest, i.e.,For UAV initiating the authentication process, we can proceed directly to the second step.
- 2.
- First Nonce: The UAV randomly generates a nonce .
- 3.
- Generate Response from PUF: The PUF on UAV is utilized to generate response corresponding to the challenge stored in its memory (and in the ground station database).
- 4.
- Compute Hashed MAC at UAV: A hash is computed at the UAV .
- 5.
- Share Secret with Ground Station: The UAV sends the nonce , its temporary pseudo-identity , and the computed hash , i.e.,Note that the PUF generated response is not shared directly but only through a message digest.
- 6.
- Secret Verification at Ground Station: The ground station upon receiving the above message from initiates the verification process:
- (a)
- To guard against a replay attack, the ground station verifies that the nonce received from the UAV is a fresh number never exchanged before between the stations.
- (b)
- The ground station checks whether the pseudo-identity of the UAV is legitimate or not. This is done by querying its database for the existence of the temporary id of the device.
- (c)
- The message digest, i.e., is now verified by the ground station after retrieving the response from its database.
If any step in the verification by the ground station fails, the request from UAV is deemed to be illegitimate and declined. In this situation, the authentication process is aborted. - 7.
- Nonce Generation at Ground Station: After verification, a random nonce is generated at the ground station.
- 8.
- Compose Message from Ground Station: The response , retrieved from the database, can be expressed as the concatenation of two equal-length sequences and , i.e.,A message with the following contents is then composed at the ground station G:
- 9.
- Response Message from Ground Station: The message is then sent to UAV .
- 10.
- Verification at UAV: Upon receiving from the ground station, UAV performs the following computations:Upon recovering the nonces, verifies the message digest by using its record of the ground station identity (saved at the time of registration). If this step is completed successfully, then UAV becomes certain about the integrity of the message and its source. After successful recovery of nonces, the UAV verifies the freshness of the message and that it is generated in response to the message sent by . In the event of failure of verification at , the authentication process is aborted.
- 11.
- Generating a Challenge for the Next Session: After verification of the message , UAV generates another random nonce . A part of the new nonce is used as the new challenge , that can be used for re-authentication or generating a new session key.The on-chip PUF is used to get the corresponding response, to the new challenge .
- 12.
- Encoding the New Response and Nonce: UAV then generates the following strings:
- 13.
- Generating Session Key at UAV: The session key for future exchange of information with ground station can now be generated at :
- 14.
- Send Message from UAV to GS: The message for the ground station consists of and the message authentication code, i.e.,
- 15.
- Recover Nonce and Session Key: The ground station recovers the new response and the nonce , and the secure session key as follows:
- 16.
- Verify Message Integrity: Next, the ground station verifies the message authentication code. If ground station cannot verify successfully, then the authentication is aborted. In the event of successful verification, the new challenge response pair for is stored in the secure database of the ground station.
- 17.
- Update the UAV Pseudo-identity: The pseudo-identity of the device at both the ground station and the UAV are now updated for use in the next session.This concludes the authentication process between the ground station and an arbitrary UAV on the network. Moreover, a new shared secret in the form of is also available to both parties for initiating the second secure session, as needed.
5.3. Inter-UAV Authentication
- 1.
- UAV establishes a secure session with the ground station by following the mutual authentication steps in the previous phase. The session key established as a result of this mutual authentication provides secure communication.
- 2.
- The UAV now sends a request to ground station G for establishing a secure session with the UAV .
- 3.
- The ground station sends an authentication command to the UAV , by using its pseudo-identity . The command for authentication is sent along with the message authentication code, i.e.,
- 4.
- In response, performs the mutual authentication steps (as outlined in the previous phase) with ground station G. As a result of this step, a secure session key is now established between the ground station and .
- 5.
- The ground station, while acting as the central authority, now generates a new key for the mutual session between and .
- 6.
- The key is distributed to and by using symmetric encryption keys and , respectively. The two UAVs are now mutually authenticated and can communicate by using the secret key .
6. Security Analysis
Security Verification by Using Mao–Boyd Logic
7. Comparison
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Gupta, L.; Jain, R.; Vaszkun, G. Survey of Important Issues in UAV Communication Networks. IEEE Commun. Surv. Tutor. 2016, 18, 1123–1152. [Google Scholar] [CrossRef]
- Hentati, A.I.; Fourati, L.C. Comprehensive survey of UAVs communication networks. Comput. Stand. Interfaces 2020, 72, 103451. [Google Scholar] [CrossRef]
- Liu, Y.; Dai, H.N.; Wang, Q.; Shukla, M.K.; Imran, M. Unmanned aerial vehicle for internet of everything: Opportunities and challenges. Comput. Commun. 2020, 155, 66–83. [Google Scholar] [CrossRef]
- Aman, M.; Chaudhry, S.; Al-Turjman, F. RapidAuth: Fast Authentication for Sustainable IoT; Springer: Cham, Switzerland, 2020; p. 1. [Google Scholar]
- Aman, M.N.; Chua, K.C.; Sikdar, B. Physically secure mutual authentication for IoT. In Proceedings of the 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, 7–10 August 2017; pp. 310–317. [Google Scholar] [CrossRef]
- Awan, K.A.; Din, I.U.; Almogren, A.; Almajed, H.; Mohiuddin, I.; Guizani, M. NeuroTrust—Artificial Neural Network-based Intelligent Trust Management Mechanism for Large-Scale Internet of Medical Things. IEEE Internet Things J. 2020, 8, 15672–15682. [Google Scholar] [CrossRef]
- Alladi, T.; Chakravarty, S.; Chamola, V.; Guizani, M. A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario. IEEE Trans. Veh. Technol. 2020, 69, 14188–14197. [Google Scholar] [CrossRef]
- Yan, W.; Zhang, N.; Njilla, L.L.; Zhang, X. PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications. IEEE Trans. Very Large Scale Integr. VLSI Syst. 2020, 28, 2196–2209. [Google Scholar] [CrossRef]
- He, D.; Chan, S.; Guizani, M. Communication Security of Unmanned Aerial Vehicles. IEEE Wirel. Commun. 2017, 24, 134–139. [Google Scholar] [CrossRef]
- Hooper, M.; Tian, Y.; Zhou, R.; Cao, B.; Lauf, A.P.; Watkins, L.; Robinson, W.H.; Alexis, W. Securing commercial WiFi-based UAVs from common security attacks. In Proceedings of the MILCOM 2016—2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1–3 November 2016; pp. 1213–1218. [Google Scholar] [CrossRef]
- Wang, W.; Tang, J.; Zhao, N.; Liu, X.; Zhang, X.Y.; Chen, Y.; Qian, Y. Joint Precoding Optimization for Secure SWIPT in UAV-Aided NOMA Networks. IEEE Trans. Commun. 2020, 68, 5028–5040. [Google Scholar] [CrossRef]
- Zhao, N.; Li, Y.; Zhang, S.; Chen, Y.; Lu, W.; Wang, J.; Wang, X. Security Enhancement for NOMA-UAV Networks. IEEE Trans. Veh. Technol. 2020, 69, 3994–4005. [Google Scholar] [CrossRef]
- Blazy, O.; Bonnefoi, P.; Conchon, E.; Sauveron, D.; Akram, R.N.; Markantonakis, K.; Mayes, K.; Chaumette, S. An Efficient Protocol for UAS Security. In Proceedings of the 2017 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, 18–20 April 2017; pp. 1–21. [Google Scholar] [CrossRef]
- Chen, L.; Qian, S.; Lim, M.; Wang, S. An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems. China Commun. 2018, 15, 61–76. [Google Scholar] [CrossRef]
- Abdallah, A.; Ali, M.Z.; Misic, J.; Misic, V.B. Efficient Security Scheme for Disaster Surveillance UAV Communication Networks. Information 2019, 10, 43. [Google Scholar] [CrossRef]
- Semal, B.; Markantonakis, K.; Akram, R.N. A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks. In Proceedings of the 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), London, UK, 23–27 September 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Verma, G.K.; Singh, B.B.; Kumar, N.; He, D. CB-PS: An Efficient Short-Certificate-Based Proxy Signature Scheme for UAVs. IEEE Syst. J. 2020, 14, 621–632. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 2019, 6, 3572–3584. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J.P.C. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment. IEEE Trans. Veh. Technol. 2019, 68, 6903–6916. [Google Scholar] [CrossRef]
- Ali, Z.; Chaudhry, S.A.; Ramzan, M.S.; Al-Turjman, F. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles. IEEE Access 2020, 8, 43711–43724. [Google Scholar] [CrossRef]
- Mohanty, S.; Yanambaka, V.; Kougianos, E.; Puthal, D. PUFchain: Hardware-Assisted Scalable Blockchain. In Proceedings of the 2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), Rourkela, India, 16–18 December 2019; pp. 324–325. [Google Scholar] [CrossRef]
- Alladi, T.; Naren, N.; Bansal, G.; Chamola, V.; Guizani, M. SecAuthUAV: A Novel Authentication Scheme for UAV-Base Station Scenario. IEEE Trans. Veh. Technol. 2020, 69, 15068–15077. [Google Scholar] [CrossRef]
- Rahim, K.; Tahir, H.; Ikram, N. Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain. In Proceedings of the 2018 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan, 4–5 September 2018; pp. 102–108. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Naren; Kumar, N. PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. Comput. Commun. 2020, 160, 81–90. [Google Scholar] [CrossRef]
- Chen, B.; Willems, F.M.J. Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes. IEEE Internet Things J. 2019, 6, 435–445. [Google Scholar] [CrossRef]
- Herder, C.; Yu, M.; Koushanfar, F.; Devadas, S. Physical Unclonable Functions and Applications: A Tutorial. Proc. IEEE 2014, 102, 1126–1141. [Google Scholar] [CrossRef]
- Frikken, K.B.; Blanton, M.; Atallah, M.J. Robust Authentication Using Physically Unclonable Functions. In Information Security; Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 262–277. [Google Scholar]
- Ghafi, B.K.; Maybodi, B.M.N. A Distributed PUF-Based Mutual Authentication System with Self-Correction. In Proceedings of the 2020 28th Iranian Conference on Electrical Engineering (ICEE), Tabriz, Iran, 4–6 August 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Mao, W.; Boyd, C. Towards formal analysis of security protocols. In Proceedings of the Computer Security Foundations Workshop VI, Franconia, NH, USA, 15–17 June 1993; pp. 147–158. [Google Scholar] [CrossRef]
S. No. | Assumption |
---|---|
1. | UAVs have the capability to communicate and coordinate with each other through permission from the central station. |
2. | It is assumed that the central station is in a secure and protected location on the ground with an abundance of computing, memory, and energy resources as compared to the individual UAVs. |
3. | We assume that the UAVs are equipped with a strong PUF device that can generate stable and reliable responses for a multitude of input sequences under a prevalent operational range of ambient conditions. |
4. | The initial step of authentication (i.e., the registration phase) is carried out prior to the deployment of the UAV stations for the mission. |
5. | The registration is performed only once before the mission and cannot be repeated during the mission. |
6. | In the registration phase, a secure channel is assumed between the ground station database and the UAV. A challenge–response pair for the PUF in each UAV station is generated and securely saved in the database of the ground station, whereas the response is never saved in the UAV device memory. |
7. | We assume that each registered UAV device has a unique PUF with ideal characteristics embedded inside the processor chip of the UAV such that any attempt to tamper with the chip or access the PUF will lead to its malfunctioning and render it unusable. |
Symbols | Description |
---|---|
Identity of i-th UAV | |
M | Number of UAVs |
G | Identity of the ground station |
Pseudo-identity of i-th UAV in k-th session | |
k-th challenge for PUF in UAV | |
Response generated by PUF to challenge | |
⊕ | Exclusive-OR operator |
Concatenation operator | |
n-th authentication message | |
n-th nonce during ’s k-th authentication attempt with G | |
Hash function computed for message | |
Session key for k-th session between and G | |
Session key for k-th session between and |
Logic Symbols | Description |
---|---|
Principal U believes M is true | |
The principal U and G share the secret K | |
The principal U has observed the message M through key K | |
The principal U believes that the message M is fresh | |
G encrypted M using key K | |
Principal G is the trusted party |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alkatheiri, M.S.; Saleem, S.; Alqarni, M.A.; Aseeri, A.O.; Chauhdary, S.H.; Zhuang, Y. A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions. Electronics 2022, 11, 2921. https://doi.org/10.3390/electronics11182921
Alkatheiri MS, Saleem S, Alqarni MA, Aseeri AO, Chauhdary SH, Zhuang Y. A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions. Electronics. 2022; 11(18):2921. https://doi.org/10.3390/electronics11182921
Chicago/Turabian StyleAlkatheiri, Mohammed Saeed, Sajid Saleem, Mohammed Ali Alqarni, Ahmad O. Aseeri, Sajjad Hussain Chauhdary, and Yu Zhuang. 2022. "A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions" Electronics 11, no. 18: 2921. https://doi.org/10.3390/electronics11182921
APA StyleAlkatheiri, M. S., Saleem, S., Alqarni, M. A., Aseeri, A. O., Chauhdary, S. H., & Zhuang, Y. (2022). A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions. Electronics, 11(18), 2921. https://doi.org/10.3390/electronics11182921