Mathematics (Feb 2024)

A Secure Authentication Protocol Supporting Efficient Handover for UAV

  • Kang Wen,
  • Shengbao Wang,
  • Yixiao Wu,
  • Jie Wang,
  • Lidong Han,
  • Qi Xie

DOI
https://doi.org/10.3390/math12050716
Journal volume & issue
Vol. 12, no. 5
p. 716

Abstract

Read online

Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they provide. Amidst this expansion, security concerns for UAVs have come to the forefront, particularly in open communication environments where they face authentication challenges and risks of sensitive data, including location information, being exposed to unauthorized parties. To address these issues, we propose a secure and lightweight authentication scheme that combines the use of anonymity mechanisms and Physical Unclonable Functions (PUFs). Specifically, we employ pseudo- and temporary identities to maintain the anonymity of UAVs, while also utilizing PUF technology to strengthen the security of Ground Station Servers (GSSs) against physical threats. Rigorous validation through ProVerif and the Random Oracle (ROR) Model indicates our scheme’s superior performance over existing protocols in terms of both efficiency and security.

Keywords