| Literature DB >> 31058821 |
Abstract
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators. If a drone is illegally captured, some important data will be exposed to the attacker. In this paper, we propose a saveless-based key management and delegation system for a multi-drone control system. The proposed system enables a multi-drone control system to highly resist physical capture by minimizing exposure of confidential data. In addition, when the drone leaves the formation for performing another mission or by a natural environment, the system can allow the drone to securely re-participate in the formation with the help of the ground control station (GCS) when it comes back. The analysis result shows that the proposed system can reduce storage space usage and require less computational overhead. From the result, we expect that the system can guarantee the resistance of physical capture and secure key management to the drones as well as many mobile IoT devices.Entities:
Keywords: Internet of Things; authentication and delegation; drones control; key management
Year: 2019 PMID: 31058821 PMCID: PMC6539563 DOI: 10.3390/s19092066
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notations for the communication protocol and key renewal protocol.
|
| Encrypt plaintext |
|
| Decrypt ciphertext |
|
| Hash chains with |
|
| Identification of drone |
|
| Identification of drone |
|
| A hop count of drone |
|
| A random nonce generated by |
|
| A set of sending nodes |
|
| A set of next-hop receiving nodes |
|
| A list of neighbor of node |
Figure 1The procedure of the group key renewal protocol.
Figure 2Example of the key renewal protocol.
Notations for withdrawal and re-participation.
| The breakaway node/the first discovered node | |
|
| A drone flight data with temporary session |
|
| A timestamp |
|
| The real position of node |
|
| The scheduled position of node |
|
| The distance threshold which follows the system settings |
|
| The breakaway time threshold |
|
| One-time session key between |
|
| Maximum of temporary session number of |
|
| Hash chain functions each hashing input is previousresult |
|
| An average cross track error threshold |
|
| Distance threshold during one temporal session |
Figure 3The procedure of the node’s withdrawal and re-participation protocol.
Notations used in the delegation system.
|
| Signing a message |
| The private key of | |
|
| Keyed hash function ( |
|
| Shared key between node |
|
| A maximum command counter |
|
| A set of nearest nodes for each delegated node |
Figure 4The procedure of the drone delegation system.
Comparison between our proposed system and some previous works.
| Criteria | Ours | GDP [ | C-PCGR [ | Chen’s [ |
|---|---|---|---|---|
| Symmetric key-based | √ | √ | √ | × |
| Capture resistant | √ | × | √ | × |
| For-/backward secrecy | √ |
| × | √ |
| Key independence | √ | × | √ | × |
| Multi-hop communication | √ | × | √ | √ |
| Msg. broadcasting support | √ | √ | × | √ |
| Mobility support | √ |
| × |
|
| Delegation support | √ | × | × | × |
Complexity analysis between our proposed system and some previous works.
| Criteria for Each Drone | Ours | GDP [ | C-PCGR [ | Chen’s [ |
|---|---|---|---|---|
| Data sent (bits) |
|
|
|
|
| computational overhead | 1 encryption, 1 decryption, | 1 decryption, 2 hashings, | ||
| Storage usage (bits) |
|
|
|
|
The experiment result for computation and networking overhead.
| Computation | Networking | ||
|---|---|---|---|
| hash chain | AES | broadcast | |
| mean (ms) | 1.10 | 3.83 | 26.9 |
| std. (ms) | 0.69 | 1.02 | 5.93 |
Figure 5The simulation result based on the experimental data about the key renewal protocol.
The simulation result for energy consumption.
| Hash | enc/dec | Trans. | KRP | |
|---|---|---|---|---|
| 30 min (mAh) | 1.23 | 2.66 | 15.95 | 23.73 |
| M600 Pro (%) | 0.027 | 0.059 | 0.35 | 0.53 |
Figure 6The result for battery power level over time on an operational scenario.