TY - JOUR
T1 - A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions
AU - Alkatheiri, Mohammed Saeed
AU - Saleem, Sajid
AU - Alqarni, Mohammed Ali
AU - Aseeri, Ahmad O.
AU - Chauhdary, Sajjad Hussain
AU - Zhuang, Yu
N1 - Publisher Copyright:
© 2022 by the authors.
PY - 2022/9
Y1 - 2022/9
N2 - A network of agents constituted of multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, and size constraints, ultra-mobile nature, and non-trusted operational environments make them susceptible to various attacks, including physical capturing and cloning attacks. A robust and resilient security protocol should be lightweight and resource-efficient in addition to providing protection against physical and tampering threats. This paper proposes an authentication protocol for a UAV-based multi-agent system robust against various threats and adversaries, including strong resistance against cloning and physical attacks. The proposed protocol is based on a physical unclonable function (PUF), a well-known hardware security primitive that is utilized for low-cost authentication and cryptographic key generation. The analysis of the proposed approach shows that it provides strong protection against various attacks, including tampering and cloning, and exhibits scalability and energy efficiency.
AB - A network of agents constituted of multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, and size constraints, ultra-mobile nature, and non-trusted operational environments make them susceptible to various attacks, including physical capturing and cloning attacks. A robust and resilient security protocol should be lightweight and resource-efficient in addition to providing protection against physical and tampering threats. This paper proposes an authentication protocol for a UAV-based multi-agent system robust against various threats and adversaries, including strong resistance against cloning and physical attacks. The proposed protocol is based on a physical unclonable function (PUF), a well-known hardware security primitive that is utilized for low-cost authentication and cryptographic key generation. The analysis of the proposed approach shows that it provides strong protection against various attacks, including tampering and cloning, and exhibits scalability and energy efficiency.
KW - authentication
KW - IoT security
KW - physical unclonable functions
KW - tampering attack
KW - unmanned aerial vehicles
UR - http://www.scopus.com/inward/record.url?scp=85138616463&partnerID=8YFLogxK
U2 - 10.3390/electronics11182921
DO - 10.3390/electronics11182921
M3 - Article
AN - SCOPUS:85138616463
SN - 2079-9292
VL - 11
JO - Electronics (Switzerland)
JF - Electronics (Switzerland)
IS - 18
M1 - 2921
ER -