Next Article in Journal
A Novel End-To-End Feature Selection and Diagnosis Method for Rotating Machinery
Next Article in Special Issue
Advances in Plasmonic Sensing at the NIR—A Review
Previous Article in Journal
Distributed Mode-Dependent Event-Triggered Passive Filtering for Flexible Manipulator with Semi-Markov Parameters
Previous Article in Special Issue
Multi-Time Resolution Ensemble LSTMs for Enhanced Feature Extraction in High-Rate Time Series
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone

1
Jeju Free International City Development Center, Jeju Island 63309, Korea
2
Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Korea
3
Faculty of Engineering and Architecture, Kore University of Enna, 94100 Enna, Italy
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2021, 21(6), 2057; https://doi.org/10.3390/s21062057
Submission received: 29 January 2021 / Revised: 5 March 2021 / Accepted: 10 March 2021 / Published: 15 March 2021
(This article belongs to the Special Issue Sensors: 20th Anniversary)

Abstract

:
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security.

1. Introduction

Unmanned Aerial Vehicles (UAVs) occupy an essential place in both military and civilian applications by playing a core role in criminal investigations, public safety organizations, transportation management facilities, and surveillance forces [1]. With the ability of dynamic mobility, quick reaction, and ease of deployment, UAVs offer new possibilities for different applications at a viable expense. In the last few years alone, networked UAVs have been a dominating area of research for different business organizations, such as Google, Facebook, Boeing, and Amazon.
High portability is one reason for interface twisting in UAV networking. Regardless of this, UAV-enabled systems support remote networks in the regions where physical interaction is troublesome or costly. It is apparent from the current research that UAVs are suitable for plenty of use cases, yet their deployments face a ton of difficulties and criticisms. Initially, the majority of the researches contend on the architectural structure of drone communication, which at present comes up short with regard to standard and unification. In addition, UAV-aided communication systems experience the ill effects of issues related to spectrum sharing [2].
Aside from these, UAV communications face specific issues identified with the architectural plan, deployment, and consistency, with broad and dependable networks alongside their security [3]. Normally, UAVs function remotely by receiving commands from the ground control stations. These command and control messages are transmitted over various channels with a variable transmission rate [4]. Since that information transmitted to/by UAVs is mainly over the air, and most of the information transferred are highly sensitive and critical [5], security is a primary concern in UAV communications. Therefore, the security of these channels in UAV systems is one of the essential requirements for robust communication between UAVs and/or between UAVs and the Ground Control Station (GCS).
The security vulnerabilities can prompt an assault on confidentiality, trustworthiness, validness, and accessibility of UAVs. Generally, cryptographic mechanisms accomplish message security and control signal assurance. Consequently, security concerns like unauthorized access, malicious control, unlawful association, or other malevolent attacks need to be mitigated effectively with limited or no consequences on the performance [6]. Recognizable proof of threats and their defense in UAV systems are critical issues to be dealt with by comprehensive and proficient methodologies.
Recently, a vulnerability has been discovered in the DJI UAVs that an attacker was able to exploit to gain user account information, which then led to UAV hijacking [6]. The attack is succeeded by intercepting users’ identification tokens by logging into the DJI forums and acting as a legitimate user. It is often the case that the administrator of the UAVs maintains information related to flight history, photographs taken during the flight, payment information, real-time access rights of UAV cameras, and location information. Accordingly, attacks on these devices, apart from other damages, may enable adversaries to leak such crucial information and violate the security and privacy of users. In general, UAVs lack suitable security mechanisms that protect them from various attacks while taking a good balance between performance and safety [7].
Such security issues, especially in a military setting, may bring devastating effects that put classified information in jeopardy. For instance, a session hijacking attack orchestrated in a military scenario enables an attacker to extract previously exchanged information and use it for different malicious activities. Additionally, communication among UAVs needs to be secured since they usually work in collaboration to achieve a specific objective, such as passing information in an ad-hoc manner. Another critical issue in the military environment, where sensitive information is transmitted and commands are triggered, is maintaining tractability. That is, any entity (UAV or GCS) should be accountable for its actions and should not be able to repudiate it. Consequently, the main aim of this paper is to design a secure UAV communication that is specially designed for military environments by which perfect forward secrecy is maintained, UAV-to-UAV (and UAV-to-GCS) communications are secured, and nonrepudiation is supported. The key contributions of this paper are listed as follows:
  • A new protocol for UAV-to-UAV and UAV-to-GCS is proposed,
  • A formal security analysis of the proposed protocol using BAN-logic and Scyther tool is carried out,
  • A detailed comparative analysis based on security property and computational overhead between the proposed and existing protocols is given,
  • The protocol is also implemented on a real UAV (powered by Raspberry Pi) and a Linux-based ground control station.
  • The remainder of the paper is organized as follows: In Section 2, the state-of-the-art study of existing drone communication protocols is described. In Section 3 and Section 4, the proposed protocol is presented in detail, and a formal security analysis of the protocol is provided, respectively. In the final three sections, performance analysis, simulation results, and conclusion of the paper are provided, respectively.

2. Related Works

The development era of drones and communication technologies are tremendously growing, where the various specialist service providers and equipment sellers are bringing constant flow of new advancements, such as network accessibility [8], offloading strategies [9], path planning [10], and various applications [11,12,13]. These enhancements go hand in hand with industrial advancements, such as in References [14,15]. In particular to UAVs, the ongoing improvements emphasize the information rate and security, which includes secrecy, honesty, verification, and non-denial of transmitted information. UAVs have a risk of information leakage as they are remotely controlled or operated through predetermined missions in a resource-limited environment. With this regard, the cryptographic mechanisms are well-known solutions against the attacks in most UAV-based communications, which help to design robust security services. UAV communication, in general, involves the drones, network providers, ground control stations, and trusted third parties for authentications. Every entity plays a significant role in the entire communication process to safeguard the system from security breaches. To this end, various researchers have studied multiple security issues concerning UAVs, such as eavesdropping, network jamming, weak authentication, and mobility management issues [16,17].
Seo et al. [18] proposed a security solution for drone-enabled delivery service by utilizing White-Box Cryptography (WBC) as a product assurance instrument for UAV landing points and cryptographic resources, alongside Public Key Infrastructure (PKI) as a verification and non-repudiation technique. The principal goals of the proposed protocol are assurance of a secret key, information protection during capturing, and secure storage of information. The authors considered different security properties, such as confidentiality, integrity, non-repudiation, authentication, and software protection. Kriz and Gabrlik [19] proposed the UranusLink packet-oriented communication protocol with both non-reliable and reliable transfer mechanisms that allow secure connection and packet loss detection. The authors discussed various related issues such as security, low data throughput, ability to data loss detection, and low latency. Won et al. [20] proposed a secure communication protocol for drones and smart objects that depend on an efficient Certificateless Signcryption Tag Key Encapsulation Mechanism (eCLSC-TKEM). Islam et al. [21] presented a group key distribution protocol for FANETs (Flying Ad hoc NETworks), which relies on a group leader that discharges the base station for other operations. The authors considered different FANET requirements, such as node mobility and changes in the topology. Maxa et al. [22] provided a protected UAV ad hoc reactive routing protocol (SUAP; Secure Uav Ad hoc routing Protocol) that depends on public-key cryptography, hash chains, and geological lashes. It is utilized to ensure the route discovery component giving trustworthiness, verification, and non-repudiation services, which is the expansion of the SAODV (Secure Ad hoc On-demand Distance Vector) routing protocol.
Other related researches such as Blazy et al. [23] proposed UAV-GCS Secure Communication Protocol by using efficient cryptographic techniques to ensure the confidentiality of sensed data. The authors highlight various interesting requirements, such as forensic-resistant property of captured UAVs should not compromise the security of UAS (Unmanned Aerial System) or the freshness of keys, to name a few. In addition, Wang et al. [24] proposed a handover key management scheme for the LTE (Long-Term Evolution)-based UAV control system to stress on the robust and secure connection to direct and control the UAVs. The paper further discussed security prerequisites such as authentication, access control, confidentiality, integrity, and user plane traffic. A certificateless group authenticated key agreement (CL-GAKA) scheme for secure communication among untrusted parties is also proposed by Semal et al. [25]. The authors considered confidentiality, message integrity, and authenticity requirements in UAV communication along with UAV-to-UAV secure channel establishment, whereas UAV-to-Infrastructure communication, as well as the routing problem, are not discussed.
Another study that examined the security requirements of UAV communications is presented by He et al. [7]. The authors discussed specific attacks like GPS jamming, spoofing, and Wi-Fi attacks along with the countermeasures. Likewise, Kim et al. [26] proposed a mechanism to confirm deletion activities in the wake of eradicating information, regardless of whether control of a remotely conveyed UAV is lost. The authors utilized a countdown-based approach and a hash chain to validate the sender of the received messages to trigger the deletion activity, significantly after UAV communication was lost. In connection to this, the security and privacy concerns of the Internet of Drones (IoD) is studied by Wazid et al. [27]. The authors also proposed a centralized authentication and key agreement scheme. The authors cover various security requirements but lack emphasis on the forward and backward perfect secrecy and non-repudiation, which are the essential requirements in critical and sensitive drone-oriented missions.

3. The Proposed Protocol

This section describes a security protocol used for UAVs to communicate with monitoring UAVs and GCS. The protocol is mainly designed to serve in a military environment with two sub-protocols: SP-D2GS (Security Protocol for Drone-to-Ground Control Station) and SP-D2MD (Security Protocol for Drone-to-Monitoring Drone).

3.1. Preliminary

Apart from their widespread usage in many application areas, UAVs have been extensively used in military settings, especially for the purpose of surveillance, search and rescue, national intelligence programs, reconnaissance, etc. [28]. Clearly, such operations are sensitive by nature, due to the fact that they almost always involve national secrets. Consequently, if exchanged information between the UAVs and the ground station are disclosed, it may bring a lot of damages—from risking international relationships to serious conflicts and wars. Thus, it is important to design a scheme that enables communicating entities to establish a secure channel before exchanging any sensitive information. In this section, such a security protocol that is particularly designed to operate in a military environment is described.
The intended communication between the UAVs and the GCS can be arranged in a direct or hierarchical fashion. In the former case, each of the participating UAVs exchange information with the GCS independently. That is, the UAVs establish a secure channel with the GCS first, and send the collected data through a wireless channel. Such arrangements can be secured with the SP-D2GCS protocol (shown as the golden colored arrows in Figure 1). For the hierarchical organization, a dedicated monitoring drone is responsible to collect and transmit various data from each of the assigned UAVs to the GCS. The monitoring drone, hence, acts as a middleman that executes the SP-D2MD protocol (shown as the blue colored arrow in Figure 1) between the UAVs and itself, and then transmits the collected data to GCS by using the SP-D2GCS security protocol. The details of these sub-protocols will be described in Section 3.3 and Section 3.4.
Prior to the execution of the proposed protocol, however, the UAVs and the GCS need to be configured with the necessary information. First, the GCS generates the long-term private and public keys for each UAV. Then, it prepares a certificate request (CSR), based on their respective public keys and other information, and sends it to the Certificate Authority (CA). Next, it prepares unique identities (ID) for each of the participants. Once the key pairs, the certificates, and the IDs are ready, they will be securely delivered to each UAV, as shown by the green arrows in Figure 1. Furthermore, GCS and UAVs are assumed to be pre-configured with various cryptographic functions, such as digital signature algorithms (e.g., ECDSA; Elliptic Curve Digital Signature Algorithm), encryption and decryption function, cryptographic hash functions (e.g., HMAC; Hash-based Message Authentication Code), pseudo-random number generators (PRNG), etc. It is also assumed that the GCS and the UAVs are time-synchronized, and that the elliptic curve domain parameters (p, a, b, G, n, and h) are decided ahead of the communication, and are known by each of the communicating entities. Additionally, important information such as pre-shared keys (for instance PIN), IP address, type of UAV (monitoring or general drone), and operation ID (IDMISSION) are configured by the user before the UAVs start their mission.

3.2. Threat Model

In computing, a threat can be understood as any incident that has the potential to bring loss or harm to a system. Substantially, threats are events that aim at violating the confidentiality, integrity, and availability properties of a computing system. Such threats can happen due to different vulnerabilities, which are weaknesses in the system as a consequence of design flaws, configuration mistakes, security policy inaccuracies, to name a few. Consequently, anyone with malicious intent and technical capability can exploit these vulnerabilities to launch an attack, thereby realizing the threats. Attacks can be orchestrated by two classes of an adversary: insider or external. The former refers to malicious attacks, such as replay, falsification, and masquerading, repudiation, or obstructions [29]. These attacks are typically carried out by a foe with legitimate or authorized system access. The latter represents attacks committed on a system network or computer system mainly either by exploiting a vulnerability of the system or by social engineering. These are threat actors that attempt to exploit security exposures, and they are generally located outside the firewall.
More often than not, cryptographic protocols are intended to work in an open environment where adversaries are capable of accessing the ciphered information exchanged between communicating peers. Such security schemes are often modeled with the Dolev-Yao (DY) threat model [30]. This model assumes an insecure public channel (which makes the communicating entities untrustworthy) and powerful adversaries that are capable of obtaining messages passing through the network, initiate and receive a conversation to and from other participants, and able of impersonating other entities. Despite all these capacities of the attacker, there is off-limits information. Some of this information is guessing random numbers generated from sample space and deciphering a ciphertext, enciphering a plaintext, or getting the same HMAC value without the proper key. Consequently, the protocol proposed in this work is modeled using the DY threat model, and only GCS is assumed to be fully trusted.
The assumptions we took in designing this protocol are described as follows. It is assumed that the elliptic curve domain parameters (p, a, b, G, n, and h) are decided ahead of the communication and are known by each of the communicating entities. The GCS and all affiliated drones can obtain a timestamp value indicating the current time, and have time synchronization to verify the given timestamp value from the other party. The GCS and all its drones have public/private key pairs and certificates supporting Elliptic Curve Digital Signature Algorithm (ECDSA), GCS assigns IDs to the drones and monitoring drones, and the user plans the operation through the related application and selects the drones included in the operation by using IDMISSION (the ID of the operation) and P (PIN number), which are provided before the execution of the protocol.
The proposed protocol is required to satisfy important security requirements to withstand various attacks. Some of the most important requirements are:
  • Mutual Authentication: for secure communication among a drone, a monitoring drone, and a GCS, the communicating entities need to authenticate each other mutually.
  • Strong Key Exchange: in order to assure the perfect forward secrecy of the protocol, a strong key exchange should be executed in a way that generated session keys cannot be recovered.
  • Confidentiality: the information exchanged between the drones and between the drone and the GCS should be protected from being accessed by unauthorized parties.
  • Integrity: it is critical to assure the authenticity of the information (that the information is not changed in between, and the source of information is genuine) exchanged between the communicating ends.
  • Non-repudiation: one of the essential security requirements in such scenarios is to make sure that the action done by one party cannot be successfully denied without others knowing about it.
  • Perfect Forward Secrecy: this property assures communicating parties that even if an adversary discloses a master key, old session keys will not be compromised.
  • Perfect Backward Secrecy: this property assures the communicating entities that even if an adversary discloses a master key, future session keys will not be compromised.
  • Protection against Denial of Service: legitimate users, such as legitimate drones, should not be denied service from a service provider, such as a GCS.
  • Protection against MITM (Man-In-The-Middle) attack: the protocol prevents an attacker from secretly relaying messages between the communicating ends.

3.3. SP-D2GCS

The drones and GCS should establish a secure channel and mutually authenticate each other before exchanging any sensitive information. For this, a security protocol, SP-D2GCS (Security Protocol for Drone-to-Ground Control Station), is needed that operates between the drones and the GCS. In SP-D2GCS protocol, drones and a GCS securely communicate to exchange telemetry and status information (from the drone to GCS) and commands and controls (from GCS to the drones). The D2GCS protocol consists of four message exchanges and is also compatible with the defacto MAVLink packet structure [31]. The notations used in both sub protocols (SP-D2GCS and SP-D2MD) are described in Table 1. The communication and packet structure of the D2GCS protocol is shown in Figure 2, and the details of the proposed protocol are shown in Figure 3.
(1)
The first thing that happens in the SP-D2GCS protocol is for D to get the operation ID (IDMISSION) and PIN (P) from the user. While doing so, or even before the actual protocol session starts, it can generate a random ECDH private key dD ∈ {1… n − 1}, where n is the order of the group generated by G. It then calculates the ECDH public key QD = dD • G. Now, D is ready to create a message M1, containing IDMISSION, its certificate (CERTD), the computed public key QD, and the current timestamp ts1, which is accompanied with the signature S1 computed by the ECDSA private key PR(D). To allow GCS to prevent the resource exhaustion attacks caused by the expensive public key operation, an HMAC is computed over the message M1 and signature S1 using the PIN number, P. Finally, the message M1, with the signature S1 and the message digest, is sent to GCS.
(2)
Upon receiving the message, GCS first checks its freshness by checking the included timestamp ts1. Once ts1 is in the acceptable threshold, it then computes HM(P, M1||S1), which is then compared with the received HMAC value. Note that doing two such verifications before the expensive public key operation, i.e., the S1 verification, helps to defend against resource exhaustion denial of service attacks. In a positive case, GCS checks the validity of the received certificate CERTD and verifies the digital signature S1 by using the public key that belongs to CERTD. If the verification of S1 holds, GCS successfully authenticates D. Now, GCS uses the same procedure D followed to prepare the ECDH private key (dGCS) and public key (QGCS = dGCS • G). It then computes the master session key MSKD-GCS = dGCS•dD•G to produce the encryption and authentication keys. While the encryption key EKD-GCS (=HM(MSKD-GCS, “D-GCS Encryption Key”||ts1)) is used to protect the confidentiality of the command CMD sent to D, the authentication key AKD-GCS (=HM(MSKD-GCS, “D-GCS Authentication Key”||ts1)) assures the authenticity and integrity of this command. GCS then arranges a message M2 (containing IDMISSION, CERTGCS, QGCS, and ts2) and signs that message with its ECDSA private key PR(GCS), followed by encrypting the command CMD with the encryption key EKD-GCS and computing HM(AKD-GCS, M2|| E(EKD-GCS, CMD)). Finally, GCS sends the message M2, the signature S2, the encrypted command, and the HMAC value to D.
(3)
Once D gets the message, it verifies the timestamp ts2 and the digital signature S2 to authenticate GCS. Next, it generates the master session key MSKD-GCS, from which the encryption and authentication keys EKD-GCS and AKD-GCS are derived using the same procedure as shown in step (2). Afterward, D computes the HMAC value and verifies if it is the same as the one it received. In turn, it extracts the operation command CMD by decrypting the received cipher using EKD-GCS. To proceed with the next step, D further composes a message M3 (containing IDMISSION, IDD, IDGCS, and ts3), concatenates it with the deciphered CMD, and signs the result by computing S(PR(D), M3||CMD). It also calculates HM(AKD-GCS, M3||S3), which is, in turn, sent together with the message M3 and the digital signature S3 to GCS.
(4)
Upon receipt of the message, GCS verifies the timestamp ts3 and the HMAC value before confirming the validity of the digital signature S3. If S3 is valid, GCS can be sure that D has successfully received the operation command CMD. S3 also plays an important role in fulfilling the non-repudiation property of the protocol by making sure that D cannot deny that it received the CMD. Similarly, GCS allows D to prove that it has sent an operation command CMD via the digital signature S4 (=S(PR(GCS), M4||CMD)). Besides, the HMAC value is calculated based on AKD-GCS to counter the threat of the resource exhaustion attacks due to the public key operation. Note that in the SP-D2GCS protocol, GCS computes and transmits optional parameters that will be used for scenarios where drones communicate with their monitoring drone. In such scenarios, it prepares for a ticket that contains a session key SK and its lifetime LT along with the IDs of D and its monitoring drone MD. In more detail, GCS computes ENC(D) = E(EKD-GCS, IDD||IDMD||IDGCS||SK||LT||ts4) and ST(D) = E(EKGCS-MD, IDMISSION||IDD||IDMD||IDGCS||SK||LT||ts4) for D and MD, respectively. Finally, the GCS sends the message M4 (optionally including ENC(D) and ST(D)), the digital signature S4, and the HMAC value. The protocol is concluded after D validates the included ts4, HMAC value, and S4, respectively. Similar to S3, S4 supports non-repudiation. If ENC(D) and ST(D) are given, D recovers the session key SK by decrypting ENC(D) with EKD-GCS.

3.4. SP-D2MD

For cases where a dedicated monitoring drone is required to collect information from different general drones and pass this information to the ground station, a separate security protocol is required. Consequently, the SP-D2MD (Security Protocol for Drone-to-Monitoring Drone) protocol is used between a general drone D and a monitoring drone MD to perform mutual authentication and key exchange, thereby protecting their subsequent communications. Once all the information is collected by the MD, the MD uses the SP-D2GCS protocol to pass this information to GCS and receive different commands and controls from it. The communication and packet structure of this sub-protocol is shown in Figure 4, and the details are depicted in Figure 5.
(1)
Note that during the D2GCS protocol session, D received the session key SK and the corresponding ticket ST(D) that allow itself to execute mutual authentication and key exchange with MD. To start this protocol, D first generates its ECDH public key pair dD and QD, before composing a message M1 containing IDMISSION, IDGCS, ST(D), IDD, QD, and ts1. It, in turn, calculates HM(SK, M1), which is sent to MD along with M1.
(2)
On receiving the message, MD verifies its freshness and decrypts ST(D) with EKGCS-MD to extract SK, which is then used to verify the received HM(SK, M1). After that, it generates the ECDH public key pair dMD and QMD, computes a master session key MSKD-MD, and computes EKD-MD and AKD-MD. Finally, D generates the two HMAC values, HM(AKD-MD, M2) and HM(SK, M2|| HM(AKD-MD, M2)), which are then sent to MD along with M2.
(3)
After verifying the received ts2 and HM(SK, M2|| HM(AKD-MD, M2)), D computes MSKD-MD, EKD-MD, and AKD-MD. With AKD-MD, HM(AKD-MD, M2) is verified, followed by sending MD a message M3 (= IDMISSION, IDD, IDMD, ts3) with HM(AKD-MD, M3). Finally, MD concludes this protocol by verifying the included ts3 and HM(AKD-MD, M3). The positive result enables MD to confirm the valid key exchange.

4. Formal Security Analysis

This section puts forward the formal analysis of the proposed security protocols described in Section 3. The formal security analysis verifies whether the security protocol actually satisfies the targeted security requirements and services or not. In the past few years, the research on formal security analysis has been continuously conducted. In this paper, the proposed protocols are formally verified through modal-logic-based analysis, such as BAN Logic [32], and automation tool, such as Scyther [33].

4.1. Formal Verification with BAN-Logic

Named after its three authors, Burrows, Abadi, and Needham, BAN logic has become one of the most used verification methods to analyze security protocols formally. BAN-Logic consists of different notations and rules that are used for formal verification.
In general, formal verification through BAN-Logic is carried out in four steps: (1) idealization, (2) assumption, (3) goals, and (4) derivation. The analysis starts by idealizing the messages exchanged between the communicating parties by representing them into suitable format by which only encrypted (non-plaintext) messages are considered. Once the messages are put in this format, underlying assumptions regarding the original messages are made and formally expressed. Next, the goals are defined and expressed formally. Finally, the goals are derived by using the BAN-Logic rules, the assumptions, and the intermediate results. Here, ‘I’, ‘A’, ‘G’, and ‘D’ are used to denote idealizations, assumptions, goals, and derivations. Table 2 and Table 3 summarize the BAN-Logic notations and rules, respectively.

4.1.1. SP-D2GCS

1.
Idealization
The SP-D2GCS protocol is formulated into the following four idealizations.
(I1
D G C S : D M I S S I O N ,   g x ,   t s 1 p
(I2
G C S D : I D M I S S I O N ,   g y ,   t s 2 , C M D , G C S A K D , G C S E K D A K , g y ,   t s 2 P U G C S 1
(I3
D G C S :   I D M I S S I O N , I D D , I D G C S ,   t s 3 ,   C M D ,   G C S A K D , G C S E K D A K
(I4
G C S D :   I D M I S S I O N , I D G C S , I D D ,   t s 4 ,   C M D A K
2.
Assumptions
The assumptions taken in the process of verification are listed below. While the assumptions A1–A4, A6, and A10 are with respect to GCS, the rest are taken by D.
(A1
  G C S   b e l i e v e s   G C S P D
(A2
  G C S   b e l i e v e s   f r e s h t s 1
(A3
  G C S   b e l i e v e s   g Y G C S
(A4
  D   b e l i e v e s   P U G C S G C S
(A5
  D   b e l i e v e s   f r e s h t s 2
(A6
  D   b e l i e v e s   g X D
(A7
  D   b e l i e v e s   f r e s h t s 1
(A8
  G   b e l i e v e s   f r e s h t s 3
(A9
  D   b e l i e v e s   f r e s h t s 4
(A10
  D   b e l i e v e s   G C S   c o n t r o l   D S K M D
3.
Goals
The goals that are expected to be met by the SP-D2GCS protocol are listed below. They primarily illustrate mutual authentication and secure key exchange between D and GCS.
(G1
  G C S   b e l i e v e s   D   b e l i e v e s   I D M I S S I O N  
(G2
  G C S   b e l i e v e s   G C S A K D
(G3
  G C S   b e l i e v e s   G C S E K D
(G4
  D   b e l i e v e s   G C S A K D  
(G5
  D   b e l i e v e s   G C S E K D
(G6
  D   b e l i e v e s   G C S   b e l i e v e s   I D M I S S I O N
(G7
  D   b e l i e v e s   G C S   b e l i e v e s   C M D
(G8
  D   b e l i e v e s   G C S   b e l i e v e s   G C S A K D
(G9
  D   b e l i e v e s   G C S   b e l i e v e s   G C S E K D
(G10
  G C S   b e l i e v e s   D   b e l i e v e s   I D D
(G11
  G C S   b e l i e v e s   D   b e l i e v e s   C M D
(G12
  G C S   b e l i e v e s   D   b e l i e v e s   G C S A K D
(G13
  G C S   b e l i e v e s   D   b e l i e v e s   G C S E K D
(G14
  D   b e l i e v e s   G C S   b e l i e v e s   I D G C S
(G15
  D   b e l i e v e s   G C S   b e l i e v e s   D S K M D
(G16
  D   b e l i e v e s   D S K M D
4.
Derivations
Based on the idealizations, the assumptions, the BAN-logic rules, and the intermediate results of the derivations, the goals set are deduced.
From (I1):
(D1
  G C S   s e e s   I D M I S S I O N ,   g x ,   t s 1 p
(D2
  G C S   b e l i e v e s   D   s a i d   I D M I S S I O N ,   g x ,   t s 1   b y   D 1 ,   A 1 ,   M M
(D3
  G C S   b e l i e v e s   D   b e l i e v e s   I D M I S S I O N ,   g x ,   t s 1   b y   D 2 ,   A 2 ,   F R ,   N V
(D4
  G C S   b e l i e v e s   D   s a i d   I D M I S S I O N   b y   D 3 ,   B C
(D5
  G C S   b e l i e v e s G C S g X Y D   b y   D 2 , B C , A 3 , D H
(D6
  G C S   b e l i e v e s G C S A K D   b y   D 5 , A 2 , B C
(D7
  G C S   b e l i e v e s G C S E K D   b y   D 5 ,   A 2 , B C
From (I2):
(D8
  D   s e e s I D M I S S I O N ,   g y ,   t s 2 , C M D , G C S A K D , G C S E K D A K ,   g y ,   t s 2 P U G C S 1
(D9
  D   b e l i e v e s   G C S   s a i d   g y ,   t s 2   b y   D 8 , B C , A 4 , M M
(D10
  D   b e l i e v e s   G C S   b e l i e v e s   g y ,   t s 2   b y   D 9 , A 5 , F R , N V
(D11
  D   b e l i e v e s G C S g X Y D   b y   D 9 , B C , A 6 , D H
(D12
  D   b e l i e v e s   G C S A K D   b y   D 11 ,   A 7 , B C
(D13
  D   b e l i e v e s   G C S E K D   b y   D 11 , A 7 , B C
(D14
  D   s e e s   I D M I S S I O N ,   g y ,   t s 2 , C M D , G C S A K D , G C S E K D A K   b y   D 10 , D R
(D15
  D   b e l i e v e s   G C S   s a i d   I D M I S S I O N ,   g y ,   t s 2 , C M D , G C S A K D , G C S E K D   b y   D 14 , D 12 , M M
(D16
  D   b e l i e v e s   G C S   b e l i e v e s   I D M I S S I O N ,   g y ,   t s 2 , C M D , G C S A K D , G C S E K D   b y   D 15 , A 5 , F R , N V
(D17
  D   b e l i e v e s   G C S   b e l i e v e s   I D M I S S I O N   b y   D 16 ,   B C
(D18
  D   b e l i e v e s   G C S   b e l i e v e s   C M D   b y   D 16 ,   B C
(D19
  D   b e l i e v e s   G C S   b e l i e v e s   G C S A K D   b y   D 16 ,   B C
(D20
  D   b e l i e v e s   G C S   b e l i e v e s   G C S E K D   b y   D 16 ,   B C
From (I3):
(D21
  G C S   s e e s   I D M I S S I O N , I D D , I D G C S ,   t s 3 ,   C M D ,   G C S A K D , G C S E K D A K
(D22
  G C S   b e l i e v e s   D   s a i d   I D M I S S I O N , I D D , I D G C S ,   t s 3 ,   C M D ,   G C S A K D , G C S E K D   b y   D 21 , D 6 , M M
(D23
  G C S   b e l i e v e s   D   b e l i e v e s   I D M I S S I O N , I D D , I D G C S ,   t s 3 ,   C M D ,   G C S A K D , G C S E K D   b y   D 22 , A 8 , N V , F R
(D24
  G C S   b e l i e v e s   D   b e l i e v e s   I D D   b y   D 23 , B C
(D25
  G C S   b e l i e v e s   D   b e l i e v e s   C M D   b y   D 23 , B C
(D26
  G C S   b e l i e v e s   D   b e l i e v e s   G C S A K D   b y   D 23 , B C
(D27
  G C S   b e l i e v e s   D   b e l i e v e s   G C S E K D   b y   D 23 , B C
From (I4):
(D28
  D   s e e s   I D M I S S I O N ,   I D G C S ,   I D D ,   t s 4 , D S K M D , C M D A K
(D29
  D   b e l i e v e s   G C S   s a i d   I D M I S S I O N , I D G C S , I D D ,   t s 4 , D S K M D ,   C M D b y   D 28 , D 12 , M M
(D30
  D   b e l i e v e s   G C S   b e l i e v e s   I D M I S S I O N , I D G C S , I D D ,   t s 4 , D S K M D , C M D   b y   D 29 , A 9 , F R ,   N V
(D31
  D   b e l i e v e s   G C S   b e l i e v e s   I D G C S   b y   D 30 , B C
(D32
  D   b e l i e v e s   G C S   b e l i e v e s   D S K M D   b y   D 30 , B C
(D33
  D   b e l i e v e s   D S K M D   b y   D 32 , A 9 , J R
From the above analysis, it is shown that the SP-D2GCS protocol fulfills each of the goals (G1~G16). Moreover, the following lemmas can be derived while showing that the target security requirements are satisfied.
Lemma 1.
The SP-D2GCS protocol provides a mutual authentication between D and GCS.
Proof. 
Through the beliefs (D4) and (D17), both D and GCS can believe IDMISSION. Also, they can believe ID of another from derived beliefs (D24) and (D31). Accordingly, this proves that D and GCS mutually authenticate each other. □
Lemma 2.
The SP-D2GCS protocol enables a secure exchange of AK and EK keys between D and GCS.
Proof. 
As shown in the derivations (D5) and (D11), both GCS and D believe the session key (gXY) is a secret key shared between them and only known to them. There are direct beliefs that AK and EK are securely exchanged between GCS and D, as shown in (D6) and (D7) and (D12) and (D13). Also, indirect beliefs of GCS and D are shown in (D19) and (D20) and (D26) and (D27). Accordingly, it can prove that D and GCS securely exchange AK and EK. □
Lemma 3.
The SP-D2GCS protocol enables a secure exchange of SK key between D and GCS.
Proof. 
The session key SK, which is used for communication between D and MD, is generated by GCS. According to (D32) and (D33), D believes SK as a secret key between itself and MD. Note that we cannot reason about the MD’s belief on SK because it is not involved in this protocol. However, the above-obtained belief can be evolved to allow MD to be sure of SK with the help of ST(D) during the SP-D2MD protocol. Therefore, we can prove that SK is securely exchanged between D and MD. □
Lemma 4.
The SP-D2GCS protocol has resistance against denial-of-service attacks.
Proof. 
(D3) shows that GCS authenticates message and its freshness prior to the expensive computations, thus protecting the protocol from resource exhaustion attacks. □
Lemma 5.
The SP-D2GCS protocol supports non-repudiation.
Proof. 
Every message of the SP-D2GCS protocol contains the public key encryption. Thus, the message can prove who transferred messages with the public key. □
Lemma 6.
The SP-D2GCS protocol supports confidentiality of CMD.
Proof. 
In the case of GCS, (D18) and (D25) can verify that D believes the operation command CMD. Besides, D can verify that GCS sends the operation command CMD as it is encrypted by EK (which is generated by the session key gXY that both D and GCS believe). Thus, D and GCS support confidentiality for operational command CMD. □
Lemma 7.
The SP-D2GCS protocol supports the integrity and data authentication of messages.
Proof. 
Concerning GCS, (D3) and (D23) show that D verifies (I1) and (I3), which illustrates the integrity and data authentication of the message. In the case of D, (D10) and (D30) show that the GCS confirms the trust of (I2) and (I4) (respectively) to support the integrity and data authentication of the message. Accordingly, it can be shown that SP-D2GC supports integrity and data authentication for messages. □
Lemma 8.
The SP-D2GCS protocol prevents the man-in-the-middle attacks.
Proof. 
The ECDHE public keys exchanged between D and MD are protected by the digital signatures that are also sent along with the keys. Also, it can be confirmed from (D5) and (D11) that both parties can trust the ECDHE public key. Accordingly, the SP-D2GCS protocol is secure against man-in-the-middle attacks. □
Lemma 9.
The SP-D2GCS protocol supports PFS and PBS.
Proof. 
Lemmas 2 and 8, above, show that gXY is securely set up between D and GCS. The private keys X and Y are immediately removed from both parties so that gXY will not be recovered in any case. Accordingly, it can be seen that the AK and EK derived from gXY support PFS and PBS. □
Hence, it can be concluded from the proofs that the SP-D2GCS protocol fulfills the security requirements outlined in Section 3, which enables it to withstand known attacks.

4.1.2. SP-D2MD

1.
Idealization
The idealized forms of the SP-D2MD protocol are shown below:
(I1
  D M D : I D M I S S I O N , I D M D , g x ,   t s 1 , D S K M D S K
(I2
  M D D :   I D M I S S I O N , I D M D , g y ,   t s 2 , D A K M D , D E K M D A K ,   g y ,   t s 2 , D S K M D S K
(I3
  D M D :   I D M I S S I O N , I D D , I D M D , g y ,   t s 3 , D A K M D , D E K M D A K
2.
Assumptions
The following are the assumptions considered while preparing the derivation process. The assumptions (A1)~(A6) are related to MD and the rest are related to D.
(A1
  M D   b e l i e v e s   D S K M D
(A2
  M D   b e l i e v e s   f r e s h t s 1
(A3
  M D   b e l i e v e s   g Y M D
(A4
  D   b e l i e v e s   D S K M D
(A5
  D   b e l i e v e s   f r e s h t s 2
(A6
  D   b e l i e v e s   g X D
(A7
  M D   b e l i e v e s   f r e s h t s 3
3.
Goals
The goals that are expected to be achieved by SP-D2MD are shown below:
(G1
  M D   b e l i e v e s   D   b e l i e v e s   D S K M D
(G2
  M D   b e l i e v e s   D A K M D
(G3
  M D   b e l i e v e s   D E K M D
(G4
  D   b e l i e v e s   M D   b e l i e v e s   D S K M D
(G5
  M D   b e l i e v e s   D A K M D
(G6
  M D   b e l i e v e s   D E K M D
(G7
  D   b e l i e v e s   M D   b e l i e v e s   I D M I S S I O N
(G8
  D   b e l i e v e s   M D   b e l i e v e s   I D M D
(G9
  D   b e l i e v e s   M D   b e l i e v e s   D A K M D
(G10
  D   b e l i e v e s   M D   b e l i e v e s   D E K M D
(G11
  M D   b e l i e v e s   D   b e l i e v e s   I D M I S S I O N
(G12
  M D   b e l i e v e s   D   b e l i e v e s   I D D
(G13
  M D   b e l i e v e s   D   b e l i e v e s   D A K M D
(G14
  M D   b e l i e v e s   D   b e l i e v e s   D E K M D
4.
Derivations
The following derivations show the steps taken to realize the goals:
From (I1):
(D1
  M D   s e e s   S T D , M 1 ,   D   S K   M D , D   S K   M D   S K   b y   I 1
(D2
  M D   s e e s   S T D   b y   D 1 ,   D R
(D3
  M D   b e l i e v e s   G C S   b e l i e v e s   I D M I S S I O N , I D M D ,   I D G C S ,   D   S K   M D , D   S K   M D ,   L T   b y   D 2 ,   A 1 ,   M M ,   A 2 ,   F R , N V
(D4
  M D   b e l i e v e s   G C S   b e l i e v e s   D   S K   M D   b y   D 3 ,   B C
(D5
  M D   b e l i e v e s   G C S   b e l i e v e s   D   S K   M D   b y   D 3 ,   B C
(D6
  M D   b e l i e v e s   D   S K   M D   b y   D 4 ,   A 3 ,   J R
(D7
  M D   b e l i e v e s   D   S K   M D   b y   D 5 ,   A 4 ,   J R
(D8
  M D   s e e s M 1 ,   D   S K   M D , D   S K   M D   S K b y   D 1 ,   D R
(D9
  M D   b e l i e v e s   D   s a i d   M 1 ,   D   S K   M D , D   S K   M D b y   D 8 ,   D 7 ,   M M
(D10
  M D   b e l i e v e s   D   b e l i e v e s   M 1 ,   D   S K   M D , D   S K   M D b y   D 9 ,   A 5 ,   F R ,   N V
(D11
  M D   b e l i e v e s   D   b e l i e v e s   D   S K   M D b y   D 10 ,   B C
(D12
  M D   b e l i e v e s   D   b e l i e v e s   D   S K   M D b y   D 10 ,   B C
(D13
  M D   b e l i e v e s   D   g X Y   M D   b y   D 9 ,   B C ,   A 6 ,   D H
(D14
  M D   b e l i e v e s   D   g X Y   M D   b y   D 9 ,   B C ,   A 6 ,   D H
From (I2):
(D15
  D   s e e s   M 2 ,   M 2 , D   g X Y   M D ,   D   g X Y   M D g X Y S K   b y   I 2
(D16
  D   b e l i e v e s   M D   s a i d   M 2 , D   g X Y   M D ,   D   g X Y   M D g X Y   b y   D 15 , A 7 ,   M M
(D17
  D   b e l i e v e s   M D   b e l i e v e s   M 2 , D   g X Y   M D ,   D   g X Y   M D g X Y   b y   D 16 ,   A 8 , F R , N V
(D18
  D   b e l i e v e s   D   g X Y   M D   b y   D 16 ,   B C ,   A 9 ,   D H
(D19
  D   b e l i e v e s   D   g X Y   M D   b y   D 16 ,   B C ,   A 9 ,   D H
(D20
D 20   D   s e e s M 2 , D   g X Y   M D ,   D   g X Y   M D g X Y b y   D 16 ,   B C
(D21
  D   b e l i e v e s   M D   b e l i e v e s   M 2 , D   g X Y   M D ,   D   g X Y   M D   b y   D 20 ,   D 19 ,   M M ,   A 8 ,   F R ,   N V
(D22
  D   b e l i e v e s   M D   b e l i e v e s   D   g X Y   M D   b y   D 21 ,   B C
(D23
  D   b e l i e v e s   M D   b e l i e v e s   D   g X Y   M D   b y   D 21 , B C
From (I3):
(D24
  M D   s e e s   M 3 , D   g X Y   M D ,   D   g X Y   M D g X Y   b y   I 3
(D25
  M D   b e l i e v e s   D   b e l i e v e s   M 3 , D   g X Y   M D ,   D   g X Y   M D   b y   D 24 , D 14 ,   M M , A 10 ,   F R ,   N V
(D26
  M D   b e l i e v e s   D   b e l i e v e s   D   g X Y   M D   b y   D 25 ,   B C
(D27
  M D   b e l i e v e s   D   b e l i e v e s   D   g X Y   M D   b y   D 25 ,   B C
From the above analysis, it is shown that the SP-D2MD protocol satisfied the goals (G1~G14). Also, the following lemmas can be derived through the satisfied requirements.
Lemma 10.
The SP-D2MD protocol provides mutual authentication between D and MD.
Proof. 
The derivation result (D10) shows that the MD authenticates D. Similarly, D authenticates MD, as shown in (D17). Hence, mutual authentication between D and MD is realized in the SP-D2GC protocol. □
Lemma 11.
The SP-D2MD protocol provides a secure key exchange of AK and EK.
Proof. 
As shown in the derivations (D13) and (D14) and (D18) and (D19), both MD and D believe that the session key (gXY) is a secret key shared between them and also believe that it is a shared secret that is only known to them. Accordingly, there is a direct belief that AK and EK are securely exchanged between GCS and D, as these keys are computed from the session key gXY. Also, the indirect belief was secured by trusting beliefs in AK and EK through (D22), (D23), (D26), and (D27). Thus, AK and EK are exchanged securely between D and MD. □
Lemma 12.
The SP-D2MD protocol prevents denial-of-service attacks.
Proof. 
In the case of MD, M1 shows freshness through (D10) and does not issue a message without knowing SK, thus supporting defense against denial-of-service attacks. In the case of D, M2 is protected by AK, which is derived from the master session key (gXY). As a result, the next message will not be processed by MD since the sender has no knowledge of the master session key; thus, supporting denial-of-service attacks. □
Lemma 13.
The SP-D2MD protocol supports confidentiality of AK and EK.
Proof. 
In the case of MD, (D13) and (D14) show the secure exchange of AK and EK, which indicates the confidentiality of AK and EK. Similarly, D can be sure about the confidentiality of AK and EK, as shown in (D18) and (D19). □
Lemma 14.
The SP-D2MD protocol supports confidentiality of SK.
Proof. 
The proof for Lemma 3 of the SP-D2GCS protocol shows that SK is exchanged between D (MD) and GCS securely. The proof of Lemma 8 shows the confidentiality of SK between D and GCS. Similarly, it can be shown that the SP-D2MD protocol supports the confidentiality of SK, as indicated in the derivations (D6) and (D7). □
Lemma 15.
The SP-D2MD protocol supports integrity and data authentication of messages.
Proof. 
The derivations (D10) and (D25) show that D supports the integrity and data authentication of the message by verifying the trust of M1 and M3. MD also verifies the trust of M2, through the derivation (D17), to support the integrity and data authentication of the message. Hence, we can verify that D and MD support the integrity and data authentication of the message. □
Lemma 16.
The SP-D2MD protocol provides defense against man-in-the-middle attacks.
Proof. 
The ECDHE public keys exchanged between D and MD are protected by the digital signatures that are also sent along with the keys. Also, it can be confirmed from (D10) and (D17) that both parties can trust the ECDHE public key. Accordingly, the SP-D2MD protocol is secure against man-in-the-middle-attack. □
Lemma 17.
The SP-D2MD protocol supports PFS and PBS.
Proof. 
As per Lemma 11 and Lemma 12 of the SP-D2MD protocol, the master session key gXY is securely set up through the Diffie–Hellman key exchange between M and MD. The private keys X and Y are immediately removed from both parties so that gXY is not recovered under any circumstances. Hence, the authentication and encryption keys derived from gXY support PFS and PBS. □
From the above proofs, we can conclude that SP-D2MD, like SP-D2GCS, is proven to satisfy mutual authentication, secure key exchange, integrity and data authentication of messages, and supports PFS, which makes it secured against known attacks.

4.2. Formal Verification with Scyther

Although the formal verification carried out by BAN-Logic validates the proposed protocol, highlighting that it meets the security goals and is secure against known attacks, BAN-Logic has found to have a limitation in pointing out some flaws [34]. Hence, for a complete formal analysis of security protocols, it is often necessary to combine BAN-Logic with automated tools such as Scyther and AVISPA (Automated Validation of Internet Security Protocols and Applications) [35]. In this paper, the automated formal verification tool Scyther is used to formally verify the SP-D2GC and SP-D2MD protocols.
Scyther, developed by Cremers in 2007, provides a graphical user interface that integrates the Command Line tool and the python scripting interface as an automated tool for formal validation. It provides validation, presentation, analysis, specification, and derivation of protocols. In particular, by providing protocol behavior classes, Scyther points out security problems through straightforward formalization and verification of protocols. The Security Protocol Description Language (SPDL) used in Scyther has a similar syntax to C/JAVA language (although case-insensitive), and defines roles as a series of events, consisting of events representing transmission and reception of information.
For protocol verification, Scyther can be used in three ways. Verification claim: verified or falsified security attributes, automatic claims: Scyther automatically generates and confirms a claim when security attributes are not specified as a claim event, and characterization: Scyther analyzes protocols and provides a finite representation of all traces, including the execution of protocol roles, so that each protocol role can be characterized. During the protocol verification process, Scyther creates an attack graph for unsafe protocols, and displays an individual attack graph for each claim. Claim events used for verification in this paper can be categorized by the functions shown in Table 4, and the details are described in Reference [26].
At first, each role is modeled in SPDL scripts. The basic roles include the D’s role, the GCS’s role, and the MD’s role, as shown in Figure 6a–c, respectively. In addition, we included the claim events to each modeling, such as Alive, Nisynch, Niagree, Weakagree, Commit/Running, and Secret. Each roles are communicated with each other through the channel set through ‘send’ and ‘recv’. These events check whether modeling can provide authentication and secrecy. If the proposed protocol is secure, the status of the result will show that every claim is OK. Otherwise, the result will show the process of leading to a vulnerable modeling state.
Scyther composes a communication environment based on SPDL scripts, as shown in Figure 6, and executes verification according to claim events. As shown in Figure 7, D, GCS, and MD of the proposed protocol have not been attacked against claim events such as Alive, Nisynch, Niagree, Weakagree, Commit/Running, and Secret. Consequently, the proposed protocol is proven to be secure against known attacks.

5. Performance Analysis

In this section, the proposed protocol is compared with four state-of-the-art security protocols [18,23,27,36], that can be deployed to protect the communication within the UAV network. The comparison is made in terms of security and computation overhead, whose results are provided in Table 5 and Table 6, respectively.
Table 5 provides the comparative analysis among protocols based on the security properties. It can see that the work in References [23,27] does not support non-repudiation property. Also, References [18,27] do not provide PFS. Therefore, if any long-term key used to derive past session keys has been exposed, adversaries can use the session keys to recover the encrypted messages to acquire sensitive data. Likewise, References [18,27] do not support PBS, thus causing the subsequent sessions to be vulnerable to various attacks, in case of compromise of any of the current long-term keys. Moreover, proposed protocols of References [23,36] are susceptible to DoS attacks due to resource exhaustion. Even worse, they perform high computational operation in order to support PFS and PBS, which puts a heavy burden on key updates during flight. In addition, protocols in References [18,23,36] do not support security between UAVs. As a result, it can be concluded that the designed security protocol offers better security compared to the other state-of-the-art protocols.
On the other hand, Table 6 compares the proposed protocol with the 4 protocols based on computation overhead. Similar to References [18,27], the proposed protocol cannot avoid excessive computational overhead in SP-D2GCS to support PFS and PBS. It is worth to note that such overhead is negligible because SP-D2GCS is executed only once. However, based on the strong session key, SK, derived from SP-D2GCS, SP-D2MD, which is primary executed in the proposed protocols, achieves relatively lightweight computation while meeting the security requirements.

6. Simulation Results

We developed the proposed security protocols using Python and tested it on an ad-hoc network that composed two real UAVs and a ground control station. The network architecture in the experimental simulation along with the actual experimental test bed for the proposed protocol are shown in Figure 8 and Figure 9, respectively. The instruments used in this experiment are also listed in Table 7. The UAVs are equipped with a companion board Raspberry-Pi that is serially interfaced with the Pixhawk flight controller. The companion board enables developers to develop a self-operating UAV according to their target application. In the experiments, we create a straightforward application where UAVs and GCS simply exchange operational data or commands with each other at a pre-defined interval. Meanwhile, before the execution of said application, the proposed security protocols were first accomplished. During the execution of the protocols, essential metrics, such as size and transmission latency of the messages, were collected. The transmission latency refers to the amount of time for a message to travel across the network.
Table 8 shows the collected values of the target metrics. Based on this, the proposed D2GCS and D2MD security protocols have a total message size of 2411 and 781 bytes, respectively. Furthermore, the average transmission latency of each message corresponds to the number of bytes it carries. Based on our experiment, it takes approximately 213 milliseconds to establish a secure channel between UAV and GCS. Meanwhile, the execution of the D2MD security protocol takes an average of 29 milliseconds. The performance of UAVs can be significantly influenced by its power consumption and transmission latency, which can be associated to the message size of a particular key exchange protocol. With regards to the former, the size of the transmitted or received messages play an important role in extending energy lifetime of UAVs, especially when the key exchange protocol is executed during its flight. On the other hand, the latter, which is still dependent on the size of the messages, has an impact on the amount of time it takes for two parties to establish the secure channel. In relation to these factors, the relatively low message size and latency obtained from our experiment indicate that the proposed protocol has a great potential in terms of the practical aspects related to UAV network security.

7. Conclusions

Although UAVs play an essential role in a wide range of application areas, there are still security issues that limit their full potential in delivering the required solution. Especially in the case of military scenarios, the security and privacy of UAVs should be among the highest priority. In order to resolve the security concerns, we proposed a security protocol (with two sub-protocols, SP-D2GCS and SP-D2MD) that enables secure communication among UAVs and between the UAV and the GCS.
Our protocol can be applied in four different deployment scenarios. Scenario one consists of multiple military UAVs with inbuilt sensors that transmit traffic to each other, in which only the monitoring drone is able to communicate with GCS directly. In this case, the SP-D2GCS protocol assists the communication between the drone and GCS, while SP-D2MD is used between the drone and monitoring drone. In case 2, apart from the communication between the drones and monitoring drones, the ordinary drones themselves communicate with each other. However, similar to case 1, it is only the monitoring drone that communicates with the GCS. The third case involves direct communication between the drones and the GCS without a monitoring node sitting between them. In such case, the SP-D2GCS protocol can be used to secure the channel. The final arrangement is similar to case two, except all intercommunicating drones also communicate with the GCS directly, which uses both of the proposed sub-protocols.
Our protocol is also evaluated to prove that it meets all the security requirements described in the proposed protocol section. The proof is conducted by using two formal verification methods, BAN-Logic and Scyther. Furthermore, both sub-protocols are implemented on a real UAV (powered by Raspberry Pi) and a Linux-based ground control station and compared to other similar protocols against security and performance. The authors would like to further consider the privacy issues in UAV communication and design an adaptive security solution as their future work.

Author Contributions

Conceptualization, Y.K., J.K., and I.Y.; methodology, Y.K., J.K., G.P., and I.Y.; validation, Y.K., J.K., and D.G.D.; formal analysis, Y.K., J.K., and D.G.D.; investigation, P.V.A. and J.K.; data curation, P.V.A. and J.K.; writing—original draft preparation, Y.K., J.K., and D.G.D.; writing—review and editing, I.Y., and G.P.; visualization, D.G.D.; supervision, I.Y.; project administration, I.Y.; funding acquisition, I.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Education (NRF-2020R1I1A2073603), as well as the Soonchunhyang University Research Fund.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Vergouw, B.; Nagel, H.; Bondt, G.; Custers, B. Drone technology: Types, payloads, applications, frequency spectrum issues and future developments. In The Future of Drone Use; TMC Asser Press: The Hague, The Netherlands, 2016; pp. 21–45. [Google Scholar]
  2. Naqvi, S.A.; Hassan, S.A.; Pervaiz, H.; Ni, Q. Drone-aided communication as a key enabler for 5G and resilient public safety networks. IEEE Commun. Mag. 2018, 56, 36–42. [Google Scholar] [CrossRef] [Green Version]
  3. Livingston, S.J.; Chandan, P.H.; Simeon, R.S.; Vikas, B. D-ARCH: A Detailed Analysis of Drone Challenges Policy Enforcements and Security Solutions. J. Comput. Theor. Nanosci. 2018, 15, 2842–2847. [Google Scholar] [CrossRef]
  4. Ismail, M.A.; Bierig, A. Identifying drone-related security risks by a laser vibrometer-based payload identification system. In Proceedings of the Laser Radar Technology and Applications XXIII, Orlando, FL, USA, 10 May 2018; Volume 10636, p. 1063603, International Society for Optics and Photonics. [Google Scholar]
  5. Bunse, C.; Plotz, S. Security analysis of drone communication protocols. In Proceedings of the International Symposium on Engineering Secure Software and Systems, Paris, France, 26–27 June 2018; Springer: Cham, Switzerland, 2018; pp. 96–107. [Google Scholar]
  6. Choudhary, G.; Sharma, V.; You, I. Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Comput. Electr. Eng. 2019, 74, 59–73. [Google Scholar] [CrossRef]
  7. He, D.; Chan, S.; Guizani, M. Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 2016, 24, 134–139. [Google Scholar] [CrossRef]
  8. Wang, J.; Jin, C.; Tang, Q.; Xiong, N.; Srivastava, G. Intelligent Ubiquitous Network Accessibility for Wireless-Powered MEC in UAV-Assisted B5G. IEEE Trans. Netw. Sci. Eng. 2020. [Google Scholar] [CrossRef]
  9. Tang, Q.; Chang, L.; Yang, K.; Wang, K.; Wang, J.; Sharma, P.K. Task number maximization offloading strategy seamlessly adapted to UAV scenario. Comput. Commun. 2020, 151, 19–30. [Google Scholar] [CrossRef]
  10. Lin, N.; Tang, J.; Li, X.; Zhao, L. A novel improved bat algorithm in UAV path planning. Comput. Mater. Contin. 2019, 61, 323–344. [Google Scholar] [CrossRef]
  11. Chen, P.Y.; Chen, G.Y. The Design of a TLD and Fuzzy-PID Controller based on the Autonomous Tracking System for Quadrotor Drones. Intell. Autom. Soft Comput. 2020, 26, 489–500. [Google Scholar] [CrossRef]
  12. Qayyum, A.; Ahmad, I.; Iftikhar, M.; Mazher, M. Object Detection and Fuzzy-Based Classification Using UAV Data. Intell. Autom. Soft Comput. 2020, 26, 693–702. [Google Scholar] [CrossRef]
  13. Zhang, L.; Bai, L.; Zhang, X.; Zhang, Y.; Yang, L.; Yan, X. Cultivated land monitoring system based on dynamic wake-up UAV and wireless of distributed storage. Comput. Mater. Contin. 2019, 61, 817–828. [Google Scholar] [CrossRef]
  14. Villalonga, A.; Beruvides, G.; Castaño, F.; Haber, R.E. Cloud-based industrial cyber–physical system for data-driven reasoning: A review and use case on an industry 4.0 pilot line. IEEE Trans. Ind. Inform. 2020, 16, 5975–5984. [Google Scholar] [CrossRef]
  15. Beruvides, G.; Juanes, C.; Castaño, F.; Haber, R.E. A self-learning strategy for artificial cognitive control systems. In Proceedings of the 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), Cambridge, UK, 22–24 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1180–1185. [Google Scholar]
  16. Choudhary, G.; Sharma, V.; You, I.; Yim, K.; Chen, I.R.; Cho, J.H. Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 560–565. [Google Scholar]
  17. Sharma, V.; Choudhary, G.; Ko, Y.; You, I. Behavior and vulnerability assessment of drones-enabled industrial internet of things (iiot). IEEE Access. 2018, 6, 43368–43383. [Google Scholar] [CrossRef]
  18. Seo, S.H.; Won, J.; Bertino, E.; Kang, Y.; Choi, D. A security framework for a drone delivery service. In Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, Singapore, 26 June 2016; ACM: New York, NY, USA, 2016; pp. 29–34. [Google Scholar]
  19. Kriz, V.; Gabrlik, P. Uranuslink-communication protocol for UAV with small overhead and encryption ability. IFAC-Pap. OnLine 2015, 48, 474–479. [Google Scholar] [CrossRef]
  20. Won, J.; Seo, S.H.; Bertino, E. A secure communication protocol for drones and smart objects. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, 14–17 April 2015; ACM: New York, NY, USA, 2015; pp. 249–260. [Google Scholar]
  21. Islam, N.; Hossain, M.K.; Ali, G.M.; Chong, P.H. An expedite group key establishment protocol for Flying Ad-Hoc Network (FANET). In Proceedings of the 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), Dhaka, Bangladesh, 13–14 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 312–315. [Google Scholar]
  22. Maxa, J.A.; Mahmoud, M.S.; Larrieu, N. Extended verification of secure UAANET routing protocol. In Proceedings of the 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), Sacramento, CA, USA, 25–29 September 2016; IEEE: Piscatvey, NJ, USA, 2016; pp. 1–16. [Google Scholar]
  23. Blazy, O.; bonnefoi, P.-F.; Conchon, E.; Sauveron, D.; Akram, R.N.; Markantonakis, K.; Mayes, K.; Chaumette, S. An Efficient Protocol for UAS Security. 2017 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, 18–20 April 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–21. [Google Scholar]
  24. Wang, G.; Lim, K.; Lee, B.S.; Ahn, J.Y. Handover Key Management in an LTE-based Unmanned Aerial Vehicle Control Network. In Proceedings of the 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Prague, Czech Republic, 21–23 August 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 200–205. [Google Scholar]
  25. Semal, B.; Markantonakis, K.; Akram, R.N. A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks. In Proceedings of the 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), London, UK, 23–27 September 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
  26. Kim, S.; Youn, T.; Choi, D.; Park, K. UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization. Wirel. Commun. Mob. Comput. 2019, 2019, 1–11. [Google Scholar] [CrossRef]
  27. Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J. Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of drones deployment. IEEE Int. Things J. 2018, 6, 3572–3584. [Google Scholar] [CrossRef]
  28. Hartmann, K.; Giles, K. UAV exploitation: A new domain for cyber power. In Proceedings of the 2016 8th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 31 May–3 June 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 205–221. [Google Scholar]
  29. Medhi, D.; Huang, D. Secure and resilient routing: Building blocks for resilient network architectures. In Information Assurance; Elsevier Inc.: Amsterdam, The Netherlands, 2008; pp. 417–448. [Google Scholar]
  30. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  31. Koubaa, A.; Allouch, A.; Alajlan, M.; Javed, Y.; Belghith, A.; Khalgui, M. Micro air vehicle link (mavlink) in a nutshell: A survey. IEEE Access. 2019, 7, 87658–87680. [Google Scholar] [CrossRef]
  32. Burrows, M.; Abadi, M.; Needham, R.M. A logic of authentication. Proceedings of the Royal Society A—Mathematical, Physical and Engineering Sciences. 1989. Available online: https://royalsocietypublishing.org/doi/abs/10.1098/rspa.1989.0125 (accessed on 11 May 2020).
  33. Cremers, C.J. The Scyther Tool: Verification, falsification, and analysis of security protocols. In Proceedings of the International Conference on Computer Aided Verification, Princeton, NJ, USA, 7–14 July 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 414–418. [Google Scholar]
  34. Boyd, C.; Mao, W. On a limitation of BAN logic. In Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, 23–27 May 1993; Springer: Berlin/Heidelberg, Germany, 1993; pp. 240–247. [Google Scholar]
  35. Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Mödersheim, S. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of the International conference on computer aided verification, Scotland, UK, 6–10 July 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 281–285. [Google Scholar]
  36. Galois, Inc. Galois Embedded Crypto: Light Weight Cryptography. Available online: https://github.com/GaloisInc/gec/blob/master/README.md (accessed on 20 April 2015).
Figure 1. Execution flow of the proposed protocol.
Figure 1. Execution flow of the proposed protocol.
Sensors 21 02057 g001
Figure 2. D2GCS communication and packet structure.
Figure 2. D2GCS communication and packet structure.
Sensors 21 02057 g002
Figure 3. SP-D2GCS protocol.
Figure 3. SP-D2GCS protocol.
Sensors 21 02057 g003
Figure 4. D2MD communication and packet structure.
Figure 4. D2MD communication and packet structure.
Sensors 21 02057 g004
Figure 5. SP-D2MD protocol.
Figure 5. SP-D2MD protocol.
Sensors 21 02057 g005
Figure 6. SPDL script of proposed protocol; (a) D’s SPDL script; (b) GCS’s SPDL script; (c) MD’s SPDL script.
Figure 6. SPDL script of proposed protocol; (a) D’s SPDL script; (b) GCS’s SPDL script; (c) MD’s SPDL script.
Sensors 21 02057 g006
Figure 7. A Scyther verification result.
Figure 7. A Scyther verification result.
Sensors 21 02057 g007
Figure 8. An illustration of UAV ad-hoc network architecture implemented in the experimental simulation.
Figure 8. An illustration of UAV ad-hoc network architecture implemented in the experimental simulation.
Sensors 21 02057 g008
Figure 9. The actual experimental testbed for the proposed security protocol.
Figure 9. The actual experimental testbed for the proposed security protocol.
Sensors 21 02057 g009
Table 1. Notations and their meaning.
Table 1. Notations and their meaning.
NotationDescription
DDrone.
MDMonitoring Drone.
GCSGround Control Station.
ECDHElliptic Curve Diffie–Hellman.
ECDSAElliptic Curve Digital Signature Algorithm.
HMACHash-based Message Authentication Code
IDMISSIONOperation ID.
PPIN number.
dXX’s ECDH Private key.
QXX’s ECDH Public key: dX • G.
PU(X)X’s ECDSA Public key.
PR(X)X’s ECDSA Private key.
HM(K, M)An HMAC function where K is a secret and M is an input message.
CERTXX’s Digital Certificate.
tsTimestamp.
CMDOperation command.
SKSession key.
MSKX-YMaster session key shared between X and Y.
EKX-YEncryption key shared between X and Y.
AKX-YAuthentication key shared between X and Y.
ST(X)X’s Authentication Ticket.
LTKey life cycle (Lifetime).
E(K, M)An encrypt function where K is a secret key and M is an input message.
D(K, C)A decrypt function where K is a secret key and C is a cipher message.
Table 2. BAN-Logic Notations.
Table 2. BAN-Logic Notations.
NotationsMeanings
P   b e l i e v e s   X   P believes that the message X is true
P   s e e s   X   P receives the message X at any point in time
P   s a i d   X   P previously sent the message X
P   c o n t r o l s   X   P has jurisdiction over X
F r e s h   X   X is fresh
P K Q   K is a secret key shared between P and Q
K P   K is the P’s public key and L is the P’s private key
P K Q   K is a shared secret between P and Q
X K   X is encrypted with a key K
X ,   Y   X is combined with Y
Table 3. BAN-Logic Rules.
Table 3. BAN-Logic Rules.
Rule NamesRules
Message Meaning Rule
(MM)
P   b e l i e v e s   P K Q ,   P   s e e s   X K   P   b e l i e v e s   Q   s a i d   X P   b e l i e v e s   P K Q ,   P   s e e s   X K   P   b e l i e v e s   Q   s a i d   X P   b e l i e v e s   K Q ,   P   s e e s   X L 1   P   b e l i e v e s   Q   s a i d   X
Nonce Verification Rule
(NV)
P   b e l i e v e s   # X ,   P   b e l i e v e s   Q   s a i d   X P   b e l i e v e s   Q   b e l i e v e s   X
Jurisdiction Rule
(JR)
P   b e l i e v e s   Q   c o n t r o l s   X ,   P   b e l i e v e s   Q   b e l i e v e s X P   b e l i e v e s X
Freshness Rule
(FR)
P   b e l i e v e s   f r e s h X P   b e l i e v e s f r e s h X , Y
Decomposition Rule
(DR)
P   s e e s   X ,   Y P   s e e s   X
Belief Conjunction Rule
(BC)
P   b e l i e v e s   X ,   P   b e l i e v e s   Y   P   b e l i e v e s X , Y P   b e l i e v e s   Q   b e l i e v e s   X , Y   P   b e l i e v e s   Q   b e l i e v e s   X P   b e l i e v e s   Q   s a i d   X , Y   P   b e l i e v e s   Q   s a i d   X
Diffie–Hellman Rule
(DH)
P   b e l i e v e s   Q   s a i d   g Y Q ,   P   b e l i e v e s   g X P   P   b e l i e v e s   P g X Y   Q P   b e l i e v e s   Q   s a i d   g Y Q ,   P   b e l i e v e s   g X P   P   b e l i e v e s   P g X Y   Q
Table 4. Claim event description.
Table 4. Claim event description.
NotationsMeanings
EventSecurity Attribute
Alive, Nisynch, Niagree, Weakagree, CommitAuthentication
SecretSecrecy
Table 5. The state-of-the-art comparison with existing protocols.
Table 5. The state-of-the-art comparison with existing protocols.
Security Requirements[18][23][27][36]Our Protocol
Confidentiality
Integrity
Mutual Authentication
Non-repudiationXX
Perfect Forward SecrecyXX
Perfect Backward SecrecyXX
Response to DoS AttacksXX
Man-in-the-middle response
D2D security supportXXX
✓: Supported, X: Unsupported.
Table 6. Computational overhead comparison.
Table 6. Computational overhead comparison.
Security ProtocolsComputational Overhead
Our ProtocolSP-D2GCSSP-D2MD
7 C S C + 4 C S + 4 C S V + 2 C D H + 11 C H M + 2 C C C S C + 2 C D H + 8 C H M
[18] 5 C W B C + 2 C S + 2 C S V
Initial StepAuthentication Step
[23]----- 2 C S C + 3 C X o R + 3 C H
[27] C b i o + 8 C X o R + 12 C H C b i o + 12 C X o R + 32 C H
[36] 2 C P C + 2 C S + 2 C S V
C b i o : Biometric Authentication, C S C : Symmetric Key Cryptography, C P C : Public Key Cryptography, C D H : Diffie–Hellman Key Exchange, C S : Digital Signature, C s v : Digital Signature Verification, C W B C : White Box Encryption, C X o R : XOR Operation, C H M : HMAC operation, C H : Hash Operation, C C V : Digital Certificate Verification.
Table 7. Implementation environment.
Table 7. Implementation environment.
EnvironmentDescription
UAVTwo UAVs each with Raspberry Pi model B+
GCSUbuntu 18.04.3 LTS, 11GB RAM, and i5-2400 CPU @3.10 GHz
LanguagePython 3.8
Table 8. Notations and their meaning.
Table 8. Notations and their meaning.
MessagesSP-D2GCSSP-D2MD
Message Size (bytes)Latency (ms*)Message Size (bytes)Latency (ms*)
M193971.1100139318.74995
M2103693.6799025710.45012
M321823.389821319.96995
M421825.03991--
Total2411213.219678129.20008
* ms: millisecond.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ko, Y.; Kim, J.; Duguma, D.G.; Astillo, P.V.; You, I.; Pau, G. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors 2021, 21, 2057. https://doi.org/10.3390/s21062057

AMA Style

Ko Y, Kim J, Duguma DG, Astillo PV, You I, Pau G. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors. 2021; 21(6):2057. https://doi.org/10.3390/s21062057

Chicago/Turabian Style

Ko, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. 2021. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone" Sensors 21, no. 6: 2057. https://doi.org/10.3390/s21062057

APA Style

Ko, Y., Kim, J., Duguma, D. G., Astillo, P. V., You, I., & Pau, G. (2021). Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors, 21(6), 2057. https://doi.org/10.3390/s21062057

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop