Privacy-Preserving Authentication Framework for UAS Traffic Management Systems

Anas Alsoliman, Abdulrahman Bin Rabiah, M. Levorato
{"title":"Privacy-Preserving Authentication Framework for UAS Traffic Management Systems","authors":"Anas Alsoliman, Abdulrahman Bin Rabiah, M. Levorato","doi":"10.1109/CSNet50428.2020.9265534","DOIUrl":null,"url":null,"abstract":"In 2015, the Federal Aviation Administration (FAA) has announced the integration of unmanned aerial vehicles (UAV) into the national airspace via a traffic management system – called UAS Traffic Management (UTM) – dedicated to Unmanned Aircraft Systems (UAS) to support advanced UAV operations such as autonomous and beyond visual line of sight (BVLOS) flight missions. The UTM incorporates an identification framework called Remote ID which mandates all UAS operators to continuously identify themselves while on flight. However, the current version of the framework lacks security features and its design has raised privacy concerns among UAS operators. This paper extends the Remote ID framework to include a Privacy-Preserving Authentication Framework that anonymously verifies the authenticity of flying UAVs. Moreover, the framework authenticates the UAV’s flight permissions without revealing neither the identity of its operator nor its entire flight path, while at the same time keeping any identifying information accessible to the authorities in case of a dispute. To satisfy the proposed security and privacy requirements, a UAV’s flight plan that is represented as a series of waypoints is transformed into localized UAV trajectories which create a set of contiguous flight zones, each with its own flight permission. This framework utilizes the Boneh–Gentry-Lynn–Shacham (BGLS) digital signature scheme to sign and transform each zone information into a flight permission and aggregate a set of signatures into a single signature along with additional attributes used to construct a Remote-ID message that anonymously authenticates flying UAVs.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th Cyber Security in Networking Conference (CSNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNet50428.2020.9265534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In 2015, the Federal Aviation Administration (FAA) has announced the integration of unmanned aerial vehicles (UAV) into the national airspace via a traffic management system – called UAS Traffic Management (UTM) – dedicated to Unmanned Aircraft Systems (UAS) to support advanced UAV operations such as autonomous and beyond visual line of sight (BVLOS) flight missions. The UTM incorporates an identification framework called Remote ID which mandates all UAS operators to continuously identify themselves while on flight. However, the current version of the framework lacks security features and its design has raised privacy concerns among UAS operators. This paper extends the Remote ID framework to include a Privacy-Preserving Authentication Framework that anonymously verifies the authenticity of flying UAVs. Moreover, the framework authenticates the UAV’s flight permissions without revealing neither the identity of its operator nor its entire flight path, while at the same time keeping any identifying information accessible to the authorities in case of a dispute. To satisfy the proposed security and privacy requirements, a UAV’s flight plan that is represented as a series of waypoints is transformed into localized UAV trajectories which create a set of contiguous flight zones, each with its own flight permission. This framework utilizes the Boneh–Gentry-Lynn–Shacham (BGLS) digital signature scheme to sign and transform each zone information into a flight permission and aggregate a set of signatures into a single signature along with additional attributes used to construct a Remote-ID message that anonymously authenticates flying UAVs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
面向UAS流量管理系统的隐私保护认证框架
2015年,美国联邦航空管理局(FAA)宣布通过一种名为UAS交通管理(UTM)的交通管理系统将无人机(UAV)整合到国家空域,该交通管理系统专门用于无人机系统(UAS),以支持先进的无人机操作,如自主和超视距(BVLOS)飞行任务。UTM结合了一个名为Remote ID的识别框架,该框架要求所有无人机操作员在飞行过程中持续识别自己。然而,该框架的当前版本缺乏安全功能,其设计引起了无人机运营商对隐私的担忧。本文扩展了远程ID框架,加入了一个匿名验证飞行无人机真实性的隐私保护认证框架。此外,该框架在不透露其操作员身份和整个飞行路径的情况下验证无人机的飞行许可,同时在发生争议的情况下保持任何识别信息可供当局访问。为了满足提出的安全和隐私要求,将无人机的飞行计划表示为一系列航路点,并将其转换为本地化的无人机轨迹,从而创建一组连续的飞行区域,每个飞行区域都有自己的飞行许可。该框架利用boneh - gentry - lynn - shachham (BGLS)数字签名方案将每个区域信息签名并转换为飞行许可,并将一组签名聚合为单个签名,以及用于构建远程id消息的附加属性,该消息用于匿名验证飞行无人机。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data A comparative performance study of cryptographic algorithms for connected vehicles A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions [Copyright notice] A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of Things
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1