{"title":"PUFDid: PUF-based Drone IDentifier and Its Application","authors":"J. Byun","doi":"10.1109/ICAIIC57133.2023.10067041","DOIUrl":null,"url":null,"abstract":"All drone-based communication protocols have used an unique pseudonym as a drone identifier (Did). Despite Did's obvious applications, however, its properties have not been much studied. In this paper, we study how to securely make a Did based on physically unclonable function (PUF). For this, first we propose four Did properties (uniqueness, identification, authenticity, and privacy) and present two PUF-based drone identifiers (PUFDid) that securely include own identifier and PUF's evaluation. We show that our PUFDid satisfies four properties proposed. We also apply our PUFDid into an inquiry system and analyze its security.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIIC57133.2023.10067041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
All drone-based communication protocols have used an unique pseudonym as a drone identifier (Did). Despite Did's obvious applications, however, its properties have not been much studied. In this paper, we study how to securely make a Did based on physically unclonable function (PUF). For this, first we propose four Did properties (uniqueness, identification, authenticity, and privacy) and present two PUF-based drone identifiers (PUFDid) that securely include own identifier and PUF's evaluation. We show that our PUFDid satisfies four properties proposed. We also apply our PUFDid into an inquiry system and analyze its security.