{"title":"可证明的安全认证协议的交通交换在无人驾驶飞行器","authors":"Vincent Omollo Nyangaresi","doi":"10.1016/j.hcc.2023.100154","DOIUrl":null,"url":null,"abstract":"<div><p>Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions. In addition, they have been deployed in civilian critical infrastructure monitoring. In this environment, real-time and massive data is exchanged between the aerial vehicles and the ground control stations. Depending on the mission of these aerial vehicles, some of the collected and transmitted data is sensitive and private. Therefore, many security protocols have been presented to offer privacy and security protection. However, majority of these schemes fail to consider attack vectors such as side-channeling, de-synchronization and known secret session temporary information leakages. This last attack can be launched upon adversarial physical capture of these drones. In addition, some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads. In this paper, an authentication protocol based on lightweight quadratic residues and hash functions is developed. Its formal security analysis is executed using the widely deployed random oracle model. In addition, informal security analysis is carried out to show its robustness under the Dolev–Yao (DY) and Canetti–Krawczyk (CK) threat models. In terms of operational efficiency, it is shown to have relatively lower execution time, communication costs, and incurs the least storage costs among other related protocols. Specifically, the proposed protocol provides a 25% improvement in supported security and privacy features and a 6.52% reduction in storage costs. In overall, the proposed methodology offers strong security and privacy protection at lower execution time, storage and communication overheads.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":3.2000,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000521/pdfft?md5=905b3445e9516ad8c201c868fb43d5f4&pid=1-s2.0-S2667295223000521-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles\",\"authors\":\"Vincent Omollo Nyangaresi\",\"doi\":\"10.1016/j.hcc.2023.100154\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions. In addition, they have been deployed in civilian critical infrastructure monitoring. In this environment, real-time and massive data is exchanged between the aerial vehicles and the ground control stations. Depending on the mission of these aerial vehicles, some of the collected and transmitted data is sensitive and private. Therefore, many security protocols have been presented to offer privacy and security protection. However, majority of these schemes fail to consider attack vectors such as side-channeling, de-synchronization and known secret session temporary information leakages. This last attack can be launched upon adversarial physical capture of these drones. In addition, some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads. In this paper, an authentication protocol based on lightweight quadratic residues and hash functions is developed. Its formal security analysis is executed using the widely deployed random oracle model. In addition, informal security analysis is carried out to show its robustness under the Dolev–Yao (DY) and Canetti–Krawczyk (CK) threat models. In terms of operational efficiency, it is shown to have relatively lower execution time, communication costs, and incurs the least storage costs among other related protocols. Specifically, the proposed protocol provides a 25% improvement in supported security and privacy features and a 6.52% reduction in storage costs. In overall, the proposed methodology offers strong security and privacy protection at lower execution time, storage and communication overheads.</p></div>\",\"PeriodicalId\":100605,\"journal\":{\"name\":\"High-Confidence Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.2000,\"publicationDate\":\"2023-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2667295223000521/pdfft?md5=905b3445e9516ad8c201c868fb43d5f4&pid=1-s2.0-S2667295223000521-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"High-Confidence Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2667295223000521\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"High-Confidence Computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667295223000521","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions. In addition, they have been deployed in civilian critical infrastructure monitoring. In this environment, real-time and massive data is exchanged between the aerial vehicles and the ground control stations. Depending on the mission of these aerial vehicles, some of the collected and transmitted data is sensitive and private. Therefore, many security protocols have been presented to offer privacy and security protection. However, majority of these schemes fail to consider attack vectors such as side-channeling, de-synchronization and known secret session temporary information leakages. This last attack can be launched upon adversarial physical capture of these drones. In addition, some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads. In this paper, an authentication protocol based on lightweight quadratic residues and hash functions is developed. Its formal security analysis is executed using the widely deployed random oracle model. In addition, informal security analysis is carried out to show its robustness under the Dolev–Yao (DY) and Canetti–Krawczyk (CK) threat models. In terms of operational efficiency, it is shown to have relatively lower execution time, communication costs, and incurs the least storage costs among other related protocols. Specifically, the proposed protocol provides a 25% improvement in supported security and privacy features and a 6.52% reduction in storage costs. In overall, the proposed methodology offers strong security and privacy protection at lower execution time, storage and communication overheads.