A Traceable and Privacy-Preserving Authentication for UAV Communication Control System
Abstract
:1. Introduction
- (1)
- Personal safety of specific persons and military and police officers: The small UAVs used by the fighters of the Organization of Islamic States could, for example, be used to attack enemy soldiers on the battlefield in the Middle East. This situation can be described as the future personal safety protection work for important persons and law enforcement officers. It is necessary to take precautions against small UAVs.
- (2)
- Protection of key infrastructure: In July 2018, Greenpeace posted a video on the Internet showing the small UAVs operated by members of Greenpeace, painted superhuman, hitting a spent fuel facility near Lyon, France. This incident still reminds us of the importance of UAV protection for key infrastructure or the environment (for example, forest fire detection).
- (3)
- Flight safety: In late December 2018 and early January 2019, London’s Gatwick and Heathrow airports were disrupted by UAVs, causing chaos in takeoff, landing, and scheduling. The former even closed for 33 h and cancelled hundreds of flights, causing losses of more than 50 million pounds.
- (4)
- Privacy and confidentiality protection: UAVs can be used to steal important confidential information, such as in Northern Ireland in August 2016, when UAVs were used to take pictures of people entering passwords in ATMs. Small UAVs can even be used as hackers’ tools to further steal business secrets. According to the reports of The Times on 21 January 2019, in recent years, secrets have been stolen by eavesdropping, or even masquerading as wireless network connections to obtain employee passwords, etc. More and more companies are seeking anti-UAV technology to ensure against commercial benefits by stealing secrets by disguising wireless network connections to obtain employee passwords and other information.
- (5)
- Other criminal behaviors: In addition to the use of military and police personnel to monitor and assist in law enforcement, small UAVs may also operate in the hands of criminals. The surveillance functions provided by UAVs also enable criminal groups to detect and monitor their targets before committing crimes.
- (6)
- Security loopholes become a hidden concern: In addition to the improper use by the users themselves, UAVs may also be attacked by intentional hackers. By means of security loopholes including GPS and control signals, wireless networks and so on, “hijacking” may take control of a UAV. Vulnerabilities in the UAV manufacturer’s security may also become another type of drone-derived security problem. A well-known software technology website Check Point reported in November 2018 that the world’s largest manufacturer, China’s Dajiang, has a security vulnerability in its identity authentication process. If it is attacked by a hacker, it may leak the location of the operator and the captured image, etc. Even the possibility of intercepting the carried goods also highlights the security problems of drones.
2. Preliminary and Security Requirements
2.1. Elliptic Curve Cryptography and Diffie–Hellman Key Exchange
- Computational Diffie–Hellman (CDH) Problem: Given and , where , , and are the generator of , compute .
- Decisional Diffie–Hellman (DDH) Problem: Given , , and , where , , and are the generators of , confirm whether or not , which is equal to confirming whether or not .
2.2. Security Requirements
- Mutual authentication: this ensures that only legitimate parties are allowed to participate in the UAV network. There are two types of authentication services: node authentication and message authentication [11,19,20,25]. In order to ensure the communication security. The communication entity should perform mutual authentication before communication. As long as the mutual authentication is implemented, some known attacks can be excluded.
- Identity anonymity: The UAV communication control system should keep identity anonymity from the attacker to ensure the users real identity is not obtained from eavesdropped or captured messages [11].
3. The Proposed Scheme
3.1. System Architecture
- (1)
- Trusted authority center: a trusted third party agency which provides a public key and private key to the registrant.
- (2)
- Manufacturer (UAV): a UAV manufacturing company. The company has jurisdiction over all manufactured UAVs.
- (3)
- Player (mobile device): a person who intends to control a UAV. He/she must first buy or rent a UAV from the manufacturer, then obtain the flight permit before he/she can control the UAV.
- (4)
- Ground control station (GCS): a control center that provides the facilities for human control of the UAV. A GCS reviews the flight path proposed by the player, and decides whether to agree to the flight request.
- All UAVs manufactured, all mobile devices carried by players, and all ground control stations must be registered to the trusted authority center through a secure channel. The manufacturer (UAV), player (with mobile device), and ground control station sends their universally unique IDs to the trusted authority center. The trusted authority center returns parameters calculated by elliptic curve group technology.
- When a player wants to control UAVs, the player carries his/her mobile device to buy or rent a UAV from the manufacturer. After mutual authentication between the player and the manufacturer, the manufacturer will transfer the purchase or rental certificate of the UAV to the player, and store the certificate to the UAV.
- After the player has the right to use the UAV, then he/she must submit flight information and a purpose to the ground control station for review. After mutual authentication between the player and the ground control station, the ground control station will transfer the decision of the flight plan to the player, and keep the relevant flight information.
- The player transfers the purchase or rental certificate of the UAV, and the flight path agreed by the ground control station to the UAV. After mutual authentication between the player and the UAV and mutual authentication between the UAV and the ground control station, the ground control station will confirm the legality of the UAV flight path. Once the legality of the relevant identity and flight path have been confirmed, the player can control the UAV through his/her mobile device.
3.2. Notations
: A k-bit prime | |
: A prime finite field | |
: An elliptic curve over | |
: A cyclic additive group of composite order | |
: A generator for the group | |
: A secret key of the trusted authority center | |
: A public key of the trusted authority center, | |
: ith one-way hash function | |
: x’s identity, like a universal unique ID code | |
: A random numbers of elliptic curve group | |
: x’s elliptic curve group signature | |
: A session key established by x and y | |
: Use a session key x to encrypt the message | |
: Use a session key x to decrypt the message | |
: The signed message for parties x and y | |
/ | : x’s private key /x’s public key |
: Use x’s private key to sign the message m | |
: Use x’s public key to verify the message m | |
: x’s verified message | |
: Determines if A is equal to B | |
: The payment message between the player and the manufacturer (UAV) | |
: The flight plan proposed by the player | |
: The flight permission issued by ground control station to UAV | |
: The GPS message reported by the UAV | |
: The session key encrypted sensitive information | |
: The purchase or rental certificate of the UAV held by the player |
3.3. Manufacturer (UAV) Registration Phase
- Step 1:
- The manufacturer selects an identity , and transmits it to the trusted authority center.
- Step 2:
- The trusted authority center selects a random number , calculates
- Step 3:
- The manufacturer verifiesIf the verification is passed, the manufacturer stores to the UAV.
3.4. Player (Mobile Device) Registration Phase
- Step 1:
- The player selects an identity , and transmits it to the trusted authority center.
- Step 2:
- The trusted authority center selects a random number , calculates
- Step 3:
- The player verifiesIf the verification is passed, the player stores to the mobile device.
3.5. Ground Control Station Registration Phase
- Step 1:
- The ground control station selects an identity , and transmits it to the trusted authority center.
- Step 2:
- The trusted authority center selects a random number , calculates
- Step 3:
- The ground control station verifiesIf the verification is passed, the ground control station stores .
3.6. Player and Manufacturer Authentication and Communication Phase
- Step 1:
- The player selects a random number , computes
- Step 2:
- Step 2: The manufacturer selects a random number , calculatesThe manufacturer then calculates
- Step 3:
- The player calculatesThe player verifies
- Step 4:
- The manufacturer verifies
- Step 5:
- The player decrypts the received message
3.7. Player and Ground Control Station Authentication and Communication Phase
- Step 1:
- The player selects a random number , computes
- Step 2:
- The ground control station selects a random number , calculatesThe ground control station then calculates
- Step 3:
- The player calculatesThe player verifies
- Step 4:
- The ground control station verifies
- Step 5:
- The player decrypts the received message
3.8. Player, UAV and Ground Control Station Authentication and Communication Phase
- Step 1:
- The player calculates
- Step 2:
- Step 2: The UAV decrypts the received messageThe UAV then chooses a random number , calculates
- Step 3:
- The ground control station chooses a random number , computesThe ground control station then calculates
- Step 4:
- The UAV calculatesThe UAV verifies
- Step 5:
- The ground control station verifies
- Step 6:
- The UAV decrypts the received message
- Step 7:
- The player decrypts the received message
3.9. Ground Control Station and UAV Authentication and Communication Phase
- Step 1:
- The ground control station calculates
- Step 2:
- The UAV decrypts the received message
- Step 3:
- The ground control station decrypts the received message
4. Security Analysis
4.1. Mutual Authentication
- G1 :
- G2 :
- G3 :
- G4 :
- G5 :
- G6 :
- G7 :
- G8 :
- M1 :
- M2 :
- A1 :
- A2 :
- A3 :
- A4 :
- A5 :
- A6 :
- A7 :
- A8 :
- The manufacturer M authenticates the player P.
By M1 and the seeing rule, Statement 1 can be derived. (Statement 1) By A2 and the freshness rule, Statement 2 can be derived. (Statement 2) By (Statement 1), A4, and the message meaning rule, Statement 3 can be derived. (Statement 3) By (Statement 2), (Statement 3), and the nonce verification rule, Statement 4 can be derived. (Statement 4) By (Statement 4) and the belief rule, Statement 5 can be derived. (Statement 5) By (Statement 5), A6, and the jurisdiction rule, Statement 6 can be derived. (Statement 6) By (Statement 6) and the belief rule, Statement 7 can be derived. (Statement 7) By (Statement 7), A8, and the jurisdiction rule, Statement 8 can be derived. (Statement 8) - The player P authenticates the manufacturer M.
By M2 and the seeing rule, Statement 9 can be derived. (Statement 9) By A1 and the freshness rule, Statement 10 can be derived. (Statement 10) By (Statement 9), A3, and the message meaning rule, Statement 11 can be derived. (Statement 11) By (Statement 10), (Statement 11), and the nonce verification rule, Statement 12 can be derived. (Statement 12) By (Statement 12) and the belief rule, Statement 13 can be derived. (Statement 13) By (Statement 13), A5, and the jurisdiction rule, Statement 14 can be derived. (Statement 14) By (Statement 14) and the belief rule, Statement 15 can be derived. (Statement 15) By (Statement 15), A7, and the jurisdiction rule, Statement 16 can be derived. (Statement 16)
- G9 :
- G10 :
- G11 :
- G12 :
- G13 :
- G14 :
- G15 :
- G16 :
- M3 :
- M4 :
- A9 :
- A10 :
- A11 :
- A12 :
- A13 :
- A14 :
- A15 :
- A16 :
- c.
- The ground control station G authenticates the player P.
By M3 and the seeing rule, Statement 17 can be derived. (Statement 17) By A10 and the freshness rule, Statement 18 can be derived. (Statement 18) By (Statement 17), A12, and the message meaning rule, Statement 19 can be derived. (Statement 19) By (Statement 18), (Statement 19), and the nonce verification rule, Statement 20 can be derived. (Statement 20) By (Statement 20) and the belief rule, Statement 21 can be derived. (Statement 21) By (Statement 21), A14, and the jurisdiction rule, Statement 22 can be derived. (Statement 22) By (Statement 22) and the belief rule, Statement 23 can be derived. (Statement 23) By (Statement 23), A16, and the jurisdiction rule, Statement 24 can be derived. (Statement 24) - d.
- The player P authenticates the ground control station G.
By M4 and the seeing rule, Statement 25 can be derived. (Statement 25) By A9 and the freshness rule, Statement 26 can be derived. (Statement 26) By (Statement 25), A11, and the message meaning rule, Statement 27 can be derived. (Statement 27) By (Statement 26), (Statement 27), and the nonce verification rule, Statement 28 can be derived. (Statement 28) By (Statement 28) and the belief rule, Statement 29 can be derived. (Statement 29) By (Statement 29), A13, and the jurisdiction rule, Statement 30 can be derived. (Statement 30) By (Statement 30) and the belief rule, Statement 31 can be derived. (Statement 31) By (Statement 31), A15, and the jurisdiction rule, Statement 32 can be derived. (Statement 32)
- G17 :
- G18 :
- G19 :
- G20 :
- G21 :
- G22 :
- G23 :
- G24 :
- M5 :
- M6 :
- A17 :
- A18 :
- A19 :
- A20 :
- A21 :
- A22 :
- A23 :
- A24 :
- e
- The ground control station G authenticates the UAV U.
By M5 and the seeing rule, Statement 33 can be derived. (Statement 33) By A18 and the freshness rule, Statement 34 can be derived. (Statement 34) By (Statement 33), A20, and the message meaning rule, Statement 35 can be derived. (Statement 35) By (Statement 34), (Statement 35), and the nonce verification rule, Statement 36 can be derived. (Statement 36) By (Statement 36) and the belief rule, Statement 37 can be derived. (Statement 37) By (Statement 37), A22, and the jurisdiction rule, Statement 38 can be derived. (Statement 38) By (Statement 38) and the belief rule, Statement 39 can be derived. (Statement 39) By (Statement 39), A24, and the jurisdiction rule, Statement 40 can be derived. (Statement 40) - f
- The UAV U authenticates the ground control station G.
By M6 and the seeing rule, Statement 41 can be derived. (Statement 41) By A17 and the freshness rule, Statement 42 can be derived. (Statement 42) By (Statement 41), A19, and the message meaning rule, Statement 43 can be derived. (Statement 43) By (Statement 42), (Statement 43), and the nonce verification rule, Statement 44 can be derived. (Statement 44) By (Statement 44) and the belief rule, Statement 45 can be derived. (Statement 45) By (Statement 45), A21, and the jurisdiction rule, Statement 46 can be derived. (Statement 46) By (Statement 46) and the belief rule, Statement 47 can be derived. (Statement 47) By (Statement 47), A23, and the jurisdiction rule, Statement 48 can be derived. (Statement 48)
- Scenario:
- A malicious attacker uses an illegal mobile reader to control an UAV.
- Analysis:
- The attacker will not succeed because the illegal mobile reader has not been registered to the trusted authority center and thus cannot calculate the correct session key . Thus, the attack will fail when the legal UAV attempts to authenticate the illegal mobile device. In the proposed scheme, the attacker cannot achieve their purpose using an illegal mobile device. In the same scenario, the proposed scheme can also defend against a malicious attack using an illegal ground control station to send a fake message to a legal UAV, because the illegal ground control station has not been registered to the trusted authority center and thus cannot calculate the correct session key . Thus, the attack will fail when the legal UAV attempts to authenticate the illegal ground control station.
4.2. Integrity and Confidentiality
- Scenario:
- A malicious attacker intercepts the transmitted message from the ground control station to the player and decrypts the message or sends a modified message to the player.
- Analysis:
- The attacker will not succeed because the legal player will use
4.3. Identity Anonymity and Privacy
4.4. Availability and Prevention of DoS Attack
4.5. Prevention of Spoofing Attack
- Scenario:
- A malicious attacker pretends a legal UAV and sends a fake message to the legal ground control station.
- Analysis:
- The attacker will not succeed because the illegal UAV has not been registered to the trusted authority center and thus cannot calculate the correct session key . Thus, the attack will fail when the legal ground control station attempts to authenticate the illegal UAV. In the proposed scheme, the attacker cannot achieve the purpose of pretending to be a legal UAV and sending a fake message. In the same scenario, the proposed scheme can also defend against a malicious attacker pretending to be a legal UAV and sending a fake message to the legal player, because the illegal UAV has not been registered to the trusted authority center and thus cannot calculate the correct session key . Thus, the attack will fail when the legal player attempts to authenticate the illegal UAV.
4.6. Non-Repudiation
4.7. Comparison of Security Issues
4.8. Computation Cost
: Polynomial function operation | |
: Multiplication operation | |
: Hash function operation | |
: Comparison operation | |
: Symmetric encryption operation | |
: Signature operation | |
: Exclusive-or operation |
4.9. Communication Cost
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Maza, I.I.; Caballero, F.F.; Capitán, J.; Martínez-de-Dios, J.R.; Ollero, A. Experimental results in multi-UAV coordination for disaster management and civil security applications. J. Intell. Robot. Syst. 2011, 61, 563–585. [Google Scholar] [CrossRef]
- Meng, X.; Wang, W.; Leong, B. SkyStitch: A cooperative Multi-UAV-based real-time video surveillance system with stitching. In Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, Brisbane, Australia, 26–30 October 2015; pp. 261–270. [Google Scholar]
- Sun, Z.; Wang, P.; Vuran, M.C.; Al-Rodhaan, M.A.; Al-Dhelaan, A.M.; Akyildiz, I.F. BorderSense: Border patrol through advanced wireless sensor networks. Ad Hoc Netw. 2011, 9, 468–477. [Google Scholar] [CrossRef] [Green Version]
- Vollgger, S.A.; Cruden, A.R. Mapping folds and fractures in basement and cover rocks using UAV photogrammetry, cape liptrap and cape Paterson, Victoria, Australia. J. Struct. Geol. 2016, 85, 168–187. [Google Scholar] [CrossRef]
- Cho, J.; Lim, G.; Biobaku, T.; Kim, S.; Parsaei, H. Safety and security management with unmanned aerial vehicle (UAV) in oil and gas industry. Proc. Manuf. 2015, 3, 1343–1349. [Google Scholar] [CrossRef] [Green Version]
- Zaouche, L.; Natalizio, E.; Bouabdallah, A. ETTAF: Efficient target tracking and filming with a flying ad hoc network. In Proceedings of the 1st ACM International Workshop on Experiences with the Design and Implementation of Smart Objects, Paris, France, 7 September 2015; pp. 49–54. [Google Scholar]
- Danoy, G.; Brust, M.R.; Bouvry, P. Connectivity stability in autonomous multi-level UAV swarms for wide area monitoring. In Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, Cancun, Mexico, 2–6 November 2015; pp. 1–8. [Google Scholar]
- Ben-Asher, Y.; Feldman, S.; Gurfil, P.; Feldman, M. Distributed decision and control for cooperative UAVs using ad hoc communication. IEEE Trans. Control Syst. Technol. 2008, 16, 511–516. [Google Scholar] [CrossRef]
- Nader, M.; Jameela, A.J.; Imad, J. Unmanned aerial vehicles applications in future smart cities. Technol. Forecast. Soc. Chang. 2018, in press. [Google Scholar] [CrossRef]
- Sedjelmaci, H.; Senouci, S.M.; Messous, M. How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network? In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Chriki, A.; Touati, H.; Snoussi, H.; Kamoun, F. FANET: Communication, mobility models and security issues. Comput. Netw. 2019, 163, 106877. [Google Scholar] [CrossRef]
- Strohmeier, M.; Lenders, V.; Martinovic, I. On the security of the automatic dependent surveillance-broadcast protocol. IEEE Commun. Surv. Tutor. 2015, 17, 1066–1087. [Google Scholar] [CrossRef] [Green Version]
- Wesson, K.D.; Humphreys, T.E.; Evans, B.L. Can Cryptography Secure Next Generation Air Traffic Surveillance? Technical Report. Available online: https://radionavlab.ae.utexas.edu/images/stories/files/papers/adsb_for_submission.pdf (accessed on 21 December 2019).
- Sedjelmaci, H.; Senouci, S.M.; Ansari, N. Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 2016, 18, 1143–1153. [Google Scholar] [CrossRef]
- Sedjelmaci, H.; Senouci, S.M.; Ansari, N. A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans. Syst. Man Cybern. Syst. 2017, 48, 1594–1606. [Google Scholar] [CrossRef]
- García-Magariño, I.; Lacuesta, R.; Rajarajan, M.; Lloret, J. Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Netw. 2019, 86, 72–82. [Google Scholar] [CrossRef]
- Xiao, L.; Xie, C.; Min, M.; Zhuang, W. User-centric view of unmanned aerial vehicle transmission against smart attacks. IEEE Trans. Veh. Technol. 2017, 67, 3420–3430. [Google Scholar] [CrossRef]
- Yoon, K.; Park, D.; Yim, Y.; Kim, K.; Yang, S.K.; Robinson, M. Security authentication system using encrypted channel on UAV network. In Proceedings of the 2017 First IEEE International Conference on Robotic Computing (IRC), Taichung, Taiwan, 10–12 April 2017; pp. 393–398. [Google Scholar]
- Chen, L.; Qian, S.; Lim, M.; Wang, S. An enhanced direct anonymous attestation scheme with mutual authentication for network-connected uav communication systems. China Commun. 2018, 15, 61–76. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet Things J. 2018, 6, 3572–3584. [Google Scholar] [CrossRef]
- Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 2019, 48, 102354. [Google Scholar] [CrossRef]
- Han, W.; Zhu, Z. An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 2014, 27, 1173–1185. [Google Scholar] [CrossRef]
- Sarath, G.; Jinwala, D.C.; Patel, S. A Survey on Elliptic Curve Digital Signature Algorithm and its Variants. Comput. Sci. Inf. Technol. (CSIT)–CSCP 2014, 121–136. [Google Scholar] [CrossRef]
- Chen, L.; Morrissey, P.; Smart, N.P. Pairings in Trusted Computing. LNCS 2008, 5209, 1–17. [Google Scholar]
- He, D.; Chan, S.; Guizani, M. Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 2017, 24, 134–139. [Google Scholar] [CrossRef]
- Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
Phase | Proof | Issuer | Holder | Verification | |
---|---|---|---|---|---|
Item | |||||
Player and manufacturer authentication and communication phase | M | P | |||
Player and ground control station authentication and communication phase | G | P | |||
Player, UAV, and ground control station authentication and communication phase | P | U | |||
G | U | ||||
U | P | ||||
Ground control station and UAV authentication and communication phase | G | U | |||
U | G |
Yoon et al. [18] | Chen et al. [19] | Wazid et al. [20] | Tian et al. [21] | The Proposed Scheme | |
---|---|---|---|---|---|
Mutual authentication | Unidirectional authentication | Yes | Yes | Unidirectional authentication | Yes |
Integrity | N/A | Yes | No | Yes | Yes |
Confidentiality | Yes | Yes | Yes | Yes | Yes |
Identity anonymity | N/A | N/A | Yes | Yes | Yes |
Availability | No | N/A | N/A | N/A | Yes |
Privacy | N/A | N/A | Yes | Yes | Yes |
Non-repudiation | No | Yes | No | Yes | Yes |
DoS attack | Yes | N/A | Yes | N/A | Yes |
Spoofing attack | N/A | N/A | Yes | N/A | Yes |
Wazid et al. [20] | The Proposed Scheme | ||
---|---|---|---|
Manufacturer (UAV) registration phase | Manufacturer (UAV) | N/A | |
Trusted authority center | |||
Player (mobile device) registration phase | Player (mobile device) | ||
Trusted authority center | |||
Ground control station registration phase | Ground control station | N/A | |
Trusted authority center | N/A | ||
Player and manufacturer authentication and communication phase | Player (mobile device) | N/A | |
Manufacturer (UAV) | N/A | ||
Player and ground control station authentication and communication phase | Player (mobile device) | N/A | |
Ground control station | N/A | ||
Player, UAV, and ground control station authentication and communication phase | Player (mobile device) | ||
Manufacturer (UAV) | |||
Ground control station | N/A | ||
Trusted authority center | N/A | ||
Ground control station and UAV authentication and communication phase | Ground control station | N/A | |
Manufacturer (UAV) | N/A |
Wazid et al. [20] | The Proposed Scheme | ||
---|---|---|---|
Manufacturer (UAV) registration phase | Message length | 560 bits | 2528 bits |
Round | 1 | 2 | |
3.5G (14 Mbps) | 0.040 ms | 0.181 ms | |
4G (100 Mbps) | 0.006 ms | 0.025 ms | |
Player (mobile device) registration phase | Message length | 880 bits | 2528 bits |
Round | 2 | 2 | |
3.5G (14 Mbps) | 0.063 ms | 0.181 ms | |
4G (100 Mbps) | 0.009 ms | 0.025 ms | |
Ground control station registration phase | Message length | N/A | 2528 bits |
Round | N/A | 2 | |
3.5G (14 Mbps) | N/A | 0.181 ms | |
4G (100 Mbps) | N/A | 0.025 ms | |
Player and manufacturer authentication and communication phase | Message length | N/A | 2816 bits |
Round | N/A | 4 | |
3.5G (14 Mbps) | N/A | 0.201 ms | |
4G (100 Mbps) | N/A | 0.028 ms | |
Player and ground control station authentication and communication phase | Message length | N/A | 2816 bits |
Round | N/A | 4 | |
3.5G (14 Mbps) | N/A | 0.201 ms | |
4G (100 Mbps) | N/A | 0.028 ms | |
Player, UAV, and ground control station authentication and communication phase | Message length | 1840 bits | 5536 bits |
Round | 3 | 6 | |
3.5G (14 Mbps) | 0.131 ms | 0.395 ms | |
4G (100 Mbps) | 0.018 ms | 0.055 ms | |
Ground control station and UAV authentication and communication phase | Message length | N/A | 2720 bits |
Round | N/A | 2 | |
3.5G (14 Mbps) | N/A | 0.194 ms | |
4G (100 Mbps) | N/A | 0.027 ms |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, C.-L.; Deng, Y.-Y.; Weng, W.; Chen, C.-H.; Chiu, Y.-J.; Wu, C.-M. A Traceable and Privacy-Preserving Authentication for UAV Communication Control System. Electronics 2020, 9, 62. https://doi.org/10.3390/electronics9010062
Chen C-L, Deng Y-Y, Weng W, Chen C-H, Chiu Y-J, Wu C-M. A Traceable and Privacy-Preserving Authentication for UAV Communication Control System. Electronics. 2020; 9(1):62. https://doi.org/10.3390/electronics9010062
Chicago/Turabian StyleChen, Chin-Ling, Yong-Yuan Deng, Wei Weng, Chi-Hua Chen, Yi-Jui Chiu, and Chih-Ming Wu. 2020. "A Traceable and Privacy-Preserving Authentication for UAV Communication Control System" Electronics 9, no. 1: 62. https://doi.org/10.3390/electronics9010062
APA StyleChen, C. -L., Deng, Y. -Y., Weng, W., Chen, C. -H., Chiu, Y. -J., & Wu, C. -M. (2020). A Traceable and Privacy-Preserving Authentication for UAV Communication Control System. Electronics, 9(1), 62. https://doi.org/10.3390/electronics9010062