Next Article in Journal
Uniqueness of a Generalized Solution for a One-Dimensional Thermal Explosion Model of a Compressible Micropolar Real Gas
Next Article in Special Issue
An Efficient Lightweight Authentication Scheme for Smart Meter
Previous Article in Journal
Advancing the Social Internet of Things (SIoT): Challenges, Innovations, and Future Perspectives
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure Authentication Protocol Supporting Efficient Handover for UAV

Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(5), 716; https://doi.org/10.3390/math12050716
Submission received: 28 January 2024 / Revised: 22 February 2024 / Accepted: 27 February 2024 / Published: 28 February 2024

Abstract

:
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they provide. Amidst this expansion, security concerns for UAVs have come to the forefront, particularly in open communication environments where they face authentication challenges and risks of sensitive data, including location information, being exposed to unauthorized parties. To address these issues, we propose a secure and lightweight authentication scheme that combines the use of anonymity mechanisms and Physical Unclonable Functions (PUFs). Specifically, we employ pseudo- and temporary identities to maintain the anonymity of UAVs, while also utilizing PUF technology to strengthen the security of Ground Station Servers (GSSs) against physical threats. Rigorous validation through ProVerif and the Random Oracle (ROR) Model indicates our scheme’s superior performance over existing protocols in terms of both efficiency and security.

1. Introduction

Unmanned Aerial Vehicle technology has become an indispensable part of the modern scientific and technological landscape, revolutionizing numerous sectors through its versatile applications. These UAVs, commonly known as drones, offer substantial benefits in diverse areas such as military operations, commercial ventures, environmental monitoring, and efficient traffic management [1,2]. The military sector leverages UAVs for surveillance, reconnaissance, and targeted operations, whereas commercial applications range from aerial photography to logistics and delivery services. In environmental monitoring, UAVs play a crucial role in tracking wildlife, assessing disaster zones, and gathering climate data. Similarly, in traffic management, they assist in congestion analysis and accident response.
As UAV technology continues to advance, significant enhancements in performance metrics, including extended flight duration, improved payload capacity, and advanced navigational systems, are observed. These improvements not only broaden the scope of UAV applications but also suggest a future where UAVs could become integral to everyday life and industrial processes. However, alongside these advancements, the rapid evolution of UAV technology introduces notable security challenges [3]. A critical concern involves UAVs’ reliance on wireless communication links with GSSs. These links are essential for operational control, data transmission, and firmware updates. The inherent openness of these wireless channels makes UAVs vulnerable to a range of network security threats, including eavesdropping, data interception, and unauthorized access [4]. A particular issue arises from the need for UAVs to frequently switch between GSS domains due to their high mobility and the limited coverage of each GSS. This necessitates the reestablishment of secure connections, which in turn requires efficient and secure authentication protocols. Traditional authentication methods are often too cumbersome for UAV use, introducing unacceptable delays and overhead in high-speed mobile environments [5]. Therefore, developing lightweight yet robust authentication protocols specifically tailored for UAVs is pressing.
Current UAV authentication protocols face several challenges, exacerbating the security risks [6]. These challenges include vulnerability to impersonation attacks, where malicious entities mimic legitimate UAVs; lack of anonymity, which could compromise the confidentiality of UAV operations; the risk of physical capture, which could lead to unauthorized access to sensitive data; and substantial computational and communication overheads, impractical in UAV contexts where resources are limited. Therefore, addressing these challenges to develop an effective, lightweight, and secure UAV handover authentication scheme is not only complex but also critical for the safe and efficient operation of UAVs in various domains. The development of such a scheme would require a multi-faceted approach, considering the unique characteristics of UAV operations, the dynamic nature of their environments, and the balance between security and performance.
The main contributions of this paper can be summarized as follows:
  • We have proposed a two-part handover authentication protocol tailored for UAV scenarios, distinguished by its lightweight and secure framework. This protocol is divided into initial authentication and subsequent handover authentication phases, enabling UAVs to achieve rapid and efficient verification with GSS following a successful initial authentication. The design significantly reduces overhead during the handover process, addressing a critical need in UAV operations for swift and secure authentication mechanisms.
  • Our protocol demonstrates exceptional defense capabilities against a wide array of common cyber threats, further augmented by its provision for user anonymity and resilience against physical attacks. The security of our protocol was rigorously validated using advanced evaluation tools like ProVerif and the ROR model, ensuring its robustness and reliability for UAV applications. This outcome directly stems from the protocol’s design principles and operational mechanics, illustrating its comprehensive security advantages over existing solutions.
  • Moreover, our protocol’s design and implementation have been shown to outperform existing authentication protocols in terms of reducing both communication and computational overheads. This performance efficiency not only underscores the protocol’s suitability for UAV applications but also positions it as a more effective alternative to current authentication methods. The analysis and comparative assessment highlight how the protocol’s innovative features contribute directly to operational efficiency, making it an advantageous choice for UAV scenarios.

1.1. Related Work

The inception of Unmanned Aerial Vehicles (UAVs) was pioneered by Gharibi et al. [7], introducing a hierarchical network control architecture for these systems. UAVs are instrumental in delivering a plethora of services, such as package delivery, traffic surveillance, and disaster response, significantly boosting work efficiency, enhancing life quality, and fostering new commercial ventures. However, the reliance of UAV communications on public channels introduces substantial security vulnerabilities, endangering data integrity and privacy. Such breaches pose dire consequences, prompting the development of robust authentication frameworks tailored for UAV ecosystems.
Deebak et al. [8] proposed a lightweight, privacy-centric scheme aimed at reducing computational burdens through autonomous knowledge acquisition. Despite its innovations, the scheme’s resilience against Global Satellite System (GSS) impersonation attacks remains insufficient [9]. Cho et al. [10] devised a bespoke authentication mechanism for UAVs, facilitating session key generation and verification by GSSs for drones on predetermined routes. However, vulnerabilities to privileged insider and verification table leakage attacks were exposed by Jan et al. [11], who then recommended a symmetric key authentication strategy to mitigate these vulnerabilities.
Further exploration by Zhang et al. [12] yielded an authentication protocol leveraging hash and XOR operations, though Chaudhary et al. [13] later identified susceptibilities to several forms of attacks, including privileged insider and smart card theft. Hussain et al. [14] introduced an elliptic curve-based authentication scheme, enhancing user-UAV communication security within designated zones. Yet, it was found vulnerable to drone impersonation and session key compromises by Zhang et al. [15]. These methodologies, however, overlooked the critical handover process necessary for extended UAV flights.
Addressing long-distance communication challenges, Kumar et al. [16] in 2018 advanced a handover protocol integrating device and base station consistency, albeit without considering computational limitations due to bilinear pairings dependency. Son et al. [17] in 2022 innovated a blockchain-based protocol facilitating UAV-GSS authentication post-initial verification, albeit susceptible to various attack vectors [18]. Babu et al. [19] developed a PUF-based protocol for seamless UAV charging, yet it remains exposed to replay attacks and lacks forward secrecy. Kwon et al. [20] introduced a handover scheme vulnerable to physical assaults and burdened by excessive overhead from GSS involvement in the process. In response, Khalid et al. [21] unveiled an efficient, anonymous handover authentication protocol in 2023, utilizing AES-RSA for heightened security, albeit with concerns over computational demands. Ren et al. [22] subsequently proposed a comprehensive, novel handover protocol for UAV applications, incorporating three distinct authentication phases. While innovative, the protocol’s complexity and communication demands may impede practical implementation in UAV operations.

1.2. Organization

In Section 2, we introduce the preliminaries of the protocol. Section 3 presents the details of our proposed protocol. In Section 4, we perform an informal security analysis of the proposed protocol. Section 5 uses the Random Oracle Model and the ProVerif formal verification tools to verify the security of the protocol. Additionally, Section 6 provides a comprehensive analysis of the protocol’s performance. Finally, we draw our conclusions in Section 7.

2. Preliminaries

In this section, we present an overview of the preliminaries, encompassing elliptic curve cryptography, physical unclonable functions, the system model, and the threat model.

2.1. Elliptic Curve Cryptography

Consider F p as a finite field where P is a prime number. Within F p , define E ( a , b ) : y 2 = x 3 + a x + b , where a , b F p and 4 a 3 + 27 b 2 mod q 0 . Let G be a cyclic group of prime order q, with P as the generator point.
Definition 1. 
Elliptic Curve Discrete Logarithm Problem (ECDLP): For given points P, Q G , where Q = s · P , it is computationally difficult to determine s from Q within polynomial time.
Definition 2. 
Elliptic Curve Computational Diffie-Hellman Problem (ECCDH): Given points P, a · P , b · P G , it is challenging to compute a · b · P within polynomial time.

2.2. Physical Unclonable Function

A PUF is a random function derived from the physical properties of a device. It exploits minor manufacturing variations in chips to generate unique keys. A PUF can be expressed as R = P U F ( C ) , where C represents the challenge value and R the response value. PUFs are characterized by two main properties:
  • Consistency: The PUF consistently produces the same output for a given input.
  • Uniqueness: Each semiconductor device has a unique PUF response or output. This uniqueness is derived from the specific manufacturing variations, making it extremely difficult for two devices to have identical PUF outputs.

2.3. System Model

Illustrated in Figure 1, we present an overview of the system model for our proposed protocol, which comprises three entities:
  • UAV: The UAV is with limited computing and storage resources. It communicates with GSSs to receive control commands and transmit sensor data. During handovers, it authenticates with the new GSS.
  • GSS: GSS provide communication links and control interfaces for UAVs. As UAVs move between GSS coverage areas, they may switch between GSS, necessitating authentication with the new GSS. GSS possess greater computational power but could be vulnerable to external attacks.
  • RA: The Registration Authority (RA) serves as a trusted third party. It issues cryptographic credentials such as certificates to UAVs during registration. The RA also shares essential public parameters with UAVs and GSS to facilitate the authentication process.

2.4. Adversary Model

The Dolev-Yao threat model [23], introduced by Dolev and Yao in 1983, is a cornerstone in cybersecurity. This seminal model distinctively delineates the security protocol from the specific cryptographic algorithms it utilizes. Its primary application is the analysis of a protocol’s security under the assumption of an ideal cryptographic system. This framework allows for the evaluation and validation of our proposed authentication and key agreement protocol for UAV communication, irrespective of the subsequent symmetric key encryption and decryption processes.
The Dolev-Yao model rigorously defines the adversary, represented as A , and their potential attack methods, which include:
  • A ’s ability to eavesdrop, intercept, delete, or alter messages over insecure wireless channels. However, they cannot modify messages sent through secure channels.
  • A ’s capability to store intercepted messages and replay them to legitimate entities such as UAVs and ground station server, and to fabricate and send false messages to impersonate legitimate parties [24].
  • A ’s potential to seize network nodes, like GSS, and extract cryptographic keys or other information through physical attack [25].
This model specifies A ’s capabilities in the context of UAV communication networks, utilizing the Dolev-Yao assumptions to assess the security and robustness of our novel authentication protocol.

3. The Proposed Handover Authentication Scheme

In this section, we will describe our proposed lightweight and secure handover authentication scheme for UAV. The specific scheme has four phases: system initialization phase, registration phase, UAV initial authentication phase and UAV handover authentication phase.
  • System initialization phase: This phase completes the generation and publication of public parameters, including the RA’s public key, private key, and appropriate hash functions.
  • Registration phase: The registration phase includes the registration of the GSS and the registration of the UAV. The GSS protects the registered information through the PUF, and the UAV hides the registration information through biometrics.
  • UAV initial authentication phase: This phase mainly completes the UAV’s initial authentication in the GSS.
  • Handover authentication phase: This phase mainly completes authentication and key negotiation when the UAV is moving from one GSS to another GSS network.

3.1. System Initialization Phase

The RA builds an elliptic curve E p ( a , b ) using P as the generator within the group G . In addition to selecting its own secret key S K R A and corresponding public key P K R A , the RA uses the one-way hash function h ( · ) .

3.2. Registration Phase

The registration phase encompasses enrollment of the GSSs and UAVs. It has two parts.

3.2.1. GSS Registration Phase

In the GSS Registration Phase, as illustrated in Table 1, each G S S i selects a unique identity G I D i , and securely transmits it to the RA over a secure channel. RA verifies the identity’s uniqueness. Upon confirmation of uniqueness, RA generates a random number b i , and computes G S S i ’s private key S K G S S i = h ( G I D i | | S K R A | | b i ) , and the corresponding public key, P K G S S i calculated as S K G S S i · P . Simultaneously, a shared secret k = h ( R I D | | S K R A ) , is established between RA and G S S i . RA confidentially transmits the values k , S K G S S i to G S S i and publicly discloses P K G S S i while securely storing the tuple ( G I D i , b i ) in its memory.
Upon receiving { k , S K G S S i } , G S S i initiates a challenge-response mechanism, generating a challenge C h a i and computing the corresponding response, R e s i = P U F ( C h a i ) . Subsequently, G S S i computes Y i = S K G S S i h ( G I D i | | R e s i ) and V i = k h ( G I D i | | S K G S S i ) , while retaining the values { Y i , V i , C h a i }.

3.2.2. UAV Registration Phase

In the UAV Registration Phase, as illustrated in Table 2, each U A V i selects a unique identity U I D i and securely transmits it to the RA. RA verifies the uniqueness of the identity. Upon confirmation of uniqueness, RA generates a random number a i , calculates A i = a i · P , and derives U A V i ’s pseudo-identity P I D i = h ( U I D i | | A i ) . Additionally, it computes d i = a i + P I D i · S K R A . RA securely transmits the values { A i , d i } to U A V i via a secure channel while securely storing the tuple ( U I D i , a i ) in its memory.
Upon reception, U A V i recalculates P I D i as h ( U I D i | | A i ) and verifies the equation d i · P = ? A i + P I D i · P K R A . Successful verification prompts U A V i to input its biometric information B i o i . It computes G e n ( B i o i ) = ( σ i , τ i ) , F i = A i h ( σ i ) , G i = d i h ( A i | | P I D i ) , and H i = h ( A i | | d i | | P I D i ) . Finally, U A V i stores the values { F i , G i , H i , R e p ( · ) } .

3.3. UAV Initial Authentication Phase

When U A V i initially enters the coverage area of GSS, it is required to undergo an initial authentication process, as illustrated in Table 3. The detailed process unfolds as follows.
  • The U A V i inputs the user’s biological information B i o i * , recovers σ i * = R e p ( B i o i * , τ i ) , then calculates A i * = h ( σ i * ) F i , P I D i * = h ( U I D i A i * ) , computes d i * = G i h ( A i * P I D i * ) , and verifies H i to check if it equals h ( A i * d i * P I D i * ) .
  • If the verification is successful, U A V i selects a random number c i and the current timestamp T 1 , and then calculates P i t = c i · P K G S S i , P i = c i · P , W 1 = P I D i h ( G I D i P i t ) , W 2 = d i h ( P I D i T 1 P i t ) , and W 3 = h ( P I D i d i A i P i t T 1 ) . It then sends the computed tuple ( W 1 , W 2 , W 3 , P i , T 1 ) to G S S i .
  • Upon receiving the values, G S S i verifies the freshness of T 1 , calculates R e s i = P U F ( C h a i ) , S K G S S i = Y i h ( G I D i R e s i ) , P i t = S K G S S i · P i , P I D i = W 1 h ( G I D i P i t ) , d i = W 2 h ( P I D i T 1 P i t ) , and A * = d i · P P I D · P K R A . It then verifies that W 3 is equal to h ( P I D i | | d i | | A * | | P i t | | T 1 ) .
  • If the validation is successful, G S S i selects random numbers e i , n i , and a timestamp T 2 , and calculates K i t = e i · P i , K i = e i · P , T I D i = P I D i h ( n i ) , W 4 = T I D i h ( K i t P I D i ) , S K i t = h ( K i t P I D i T I D i ) , k = V i h ( G I D i S K G S S i ) , Q i = h ( T I D i k ) , W 5 = Q i h ( K i t ) , and W 6 = h ( S K i t Q i T 2 ) . G S S i then sends the values ( W 4 , W 5 , W 6 , K i , T 2 ) to U A V i .
  • Based on the received values, U A V i checks the freshness of T 2 and calculates K i t = c i · K i , T I D i = W 4 h ( K i t P I D i ) , Q i = W 5 h ( K i t ) , and S K i t = h ( K i t P I D i T I D i ) . Finally, U A V i verifies W 6 to confirm if it equals h ( S K i t Q i T 2 ) . Consequently, U A V i completes authentication with G S S i , securing the session key S K i t and a temporary identity T I D i .

3.4. UAV Handover Authentication Phase

After the successful authentication of the U A V i and G S S i , when the U A V i enters the coverage of G S S j , the U A V i and G S S j need to complete a new authentication. This handover authentication process is described in Table 4, and the process is shown below.
  • The U A V i generates a random number m i and a timestamp T 3 , then calculates W 7 = h ( P I D i | | T I D i | | G I D j | | T 3 ) m i , W 8 = Q i P I D i , W 9 = h ( m i | | P I D i | | T I D i | | T 3 ) . Subsequently, the U A V i sends ( T I D i , W 7 , W 8 , W 9 , T 3 ) to G S S j .
  • Once the above information is received, G S S j first checks the freshness of the T 3 , and if the test passes, calculates R e s j = P U F ( C h a j ) , S K G S S j = Y j h ( G I D j | | R e s j ) , k = V j h ( G I D j | | S K G S S j ) , Computes P I D i * = W 8 h ( T I D i | | k ) , m i * = W 7 h ( P I D i * | | T I D i | | G I D j | | T 3 ) , and verifies W 9 = ? h ( m i | | P I D i * | | T I D i | | T 3 ) .
  • If the above verification is passed, G S S j generates random numbers e j , n j and a timestamp T 4 , calculates T I D j = P I D i h ( n j ) , W 10 = T I D j h ( m i | | P I D i ) , W 11 = e j h ( m i | | T I D j | | P I D i ) , S K i j = h ( m i | | e j | | T I D j | | P I D i ) , W 12 = h ( S K i j | | T 4 ) , and then sends the calculated results ( W 10 , W 11 , W 12 , T 4 ) to U A V i .
  • After receiving the information transmitted by G S S j , the U A V i verifies the freshness of the T 4 , then calculates T I D j = W 10 h ( m i | | P I D i ) , e j = W 11 h ( m i | | T I D j | | P I D i ) , S K i j = h ( m i | | e j | | T I D j | | P I D i ) , verifies M 13 = ? h ( S K i j | | T 4 ) . Through the above calculation, the session key S K i j can be obtained, and a new temporary identity T I D j can be obtained. At this point, the U A V i completes the handover authentication process.

4. Informal Security Analysis

In this section, we show that our proposed scheme is secure through analysis on various desirable security properties.

4.1. Mutual Authentication

In our protocol, G S S i authenticates U A V i by verifying the correctness of A i = ? d i · P P I D · P K R A . Conversely, U A V i authenticates G S S j by validating the correctness of K i t = c i · K i . This process ensures mutual authentication between G S S i and U A V i .

4.2. Impersonation Attack

Consider a scenario where an adversary A attempts to impersonate a UAV. A intercepts the messages ( W 1 , W 2 , W 3 , P i , T 1 ) on public channels, where each W is defined by specific cryptographic operations. Despite interception, A cannot compute W 1 , W 2 , and W 3 due to the lack of access to P I D i . Therefore, our protocol is resilient against UAV impersonation attacks.

4.3. Replay Attack

Assume an adversary A captures previously transmitted messages over public channels. A may try retransmitting these messages. However, due to the incorporation of a timestamp mechanism in our protocol, which guarantees message freshness, A cannot generate a session key with the GSS. Consequently, our protocol effectively thwarts replay attacks.

4.4. GSS Physical Capture Attack

In our protocol, each GSS is equipped with a PUF and stores Y i , V i , and C h a i , defined by specific cryptographic operations. In the event of a GSS capture by an adversary A , they cannot access the secret parameters S K G S S i and k. Hence, our protocol is safeguarded against GSS physical capture attacks.

4.5. MITM Attack

In a man-in-the-middle (MITM) attack scenario, adversary A intercepts specific messages. However, A is unable to access crucial secret values and random numbers necessary for generating authentication requests/responses and the session key. This incapacity of A to derive these critical elements ensures our scheme’s resistance to MITM attacks.

4.6. Anonymity and Untraceability

During preliminary authentication, a pseudonym P I D i is used, safeguarding the UAV’s real identity G I D i . This approach ensures the UAV’s identity remains anonymous. Furthermore, the usage of a dynamic temporary identity T I D i , updated during handover authentication, prevents adversary A from tracking the UAV, thus ensuring unlinkability.

4.7. Perfect Forward Secrecy

Assuming the leakage of long-term private keys of entities, our protocol maintains security. The session key S K i t , derived through complex cryptographic operations, remains secure due to the ECDLP problem, preventing adversary A from deducing the random numbers from each session. This design ensures the provision of perfect forward secrecy in our scheme.

5. Formal Security Analysis

In this section, we present a formal security proof using a ROR model and utilize the ProVerif formal verification tool to validate the proposed security protocol.

5.1. Formal Security Analysis under ROR Model

Definition 3. 
(Participants): Three parties involved in our protocol: one Unmanned Aerial Vehicle (UAV), one ground station server (GSS) and one registration authority (RA). Each party can have multiple instances, and the i-th instance of UAV and GSS are denoted as U i and G i , respectively. The verification can output three possible results. The accept state indicates that the input message is valid. The reject state means the input data is incorrect. Thestate represents that there is no response to the input. The adversary is able to simulate queries to interact with the UVA or GSS. The details of the queries are presented in Table 5.
Definition 4. 
(Semantic security): A is permitted to make a single query to the Test( U i , G i , r) and and multiple other queries to determine the correctness of the return value of Test( U i , G i , r). A ’s advantage in guessing r is defined as A d v P = | 2 P r [ s u c ( A ) ] 1 | < η represents the protocol is secure, where η is sufficiently small.
Theorem 1. 
The advantage of obtaining the session key in polynomial time by A is A d v P q h 2 2 l h + q s 2 l b i o 1 + 2 A d v P U F + 2 A d v E C D L P . Where q s , q h , and q e represent performing the queries Send, Hash and Execute within time t. The hash, transcripts, and biological key have lengths of l h , l b i o and n respectively. The advantages of A in breaking the PUF and ECDLP are A d v P U F and A d v E C D L P respectively.
Proof. 
The games are defined to simulate the attacks launched by A , and divided from G 0 to G 4 . A correctly guessing the random number r represents W i n i ( 0 i 4 ) .
G 0 : This game simulates the real attack initially launched by A . According to the definition, we obtain:
A d v G 0 = | 2 P r [ W i n 0 1 ] |
G 1 : This game simulates the E x e c u t e query to obtain all publicly transmitted messages. Then, A verifies the session key through the R e v e a l s and T e s t queries. Due to the ECDLP, the attacker cannot determine the association between the captured messages and the session key. Hence,
P r [ W i n 1 ] = P r [ W i n 0 ]
G 2 : This game simulates hash and transcript collisions. By the Birthday Paradox, the probability of hash collisions is at most q h 2 2 l h . Therefore, we obtain:
P r [ W i n 2 ] P r [ W i n 1 ] q h 2 2 l h + 1 + ( q s + q e ) 2 2 n
G 3 : This game simulates the C o r r u p t query to obtain stored information { F i , G i , H i , R e p ( · ) } in UAV and { Y i , V i , C h a i } in GSS, where F i = A i h ( σ i ) , σ i is the biometric key, S K G S S i = h ( G I D i | | P U F ( C h a i ) ) Y i . If A is able to guess the value of σ or break the PUF, then A will be able to access valuable parameters. As a result, we get:
P r [ W i n 3 ] P r [ W i n 2 ] q s 2 l b i o + A d v P U F
G 4 : A can obtain P i = c i · P and K i = e i · P publicly, which are then used for session key agreement. This game simulates A solving the ECDH problem. We have:
P r [ W i n 4 ] P r [ W i n 3 ] A d v E C D L P
The session key is independently randomly generated, meaning that A guessing r has the same difficulty as guessing the session key directly. As a result, we have:
P r [ W i n 4 ] = 1 2
Combining the above formulas, we have:
1 2 A d v P = | P r [ W i n 0 ] 1 2 |
q h 2 2 l h + 1 + q s 2 l b i o + A d v P U F + A d v E C D L P
A d v P q h 2 2 l h + q s 2 l b i o 1 + 2 A d v P U F + 2 A d v E C D L P

5.2. Formal Verification Using ProVerif

ProVerif is recognized as an automated verification tool adept at handling a variety of cryptographic algorithms, including symmetric and asymmetric encryption, hash functions, digital signatures, and more. It is particularly effective in assessing security properties such as confidentiality, authentication, and other essential attributes. In this section, we utilize ProVerif to evaluate the security of our proposed scheme.
The initial segment presents declarations relevant to the scheme, covering aspects such as message transmission channels, constants, variables, functions, and events. Figure 2 details the definition of a public channel, named ch1, utilized for UAV-GSS node communication. This includes the establishment of constants, variables, the hash function h ( · ) , various connection functions, XOR, and ECC operations. The model for the attacker’s queries and the events are primarily detailed in Figure 3.
The second segment comprehensively examines the participation process of the UAV, as depicted in Figure 4. Initially, the UAV retrieves stored data following biological verification, sends authentication messages to the GSS, and generates session keys based on the information received from the GSS. The involvement of the GSS is illustrated in Figure 5. This includes decrypting messages using the GSS’s private key, verifying the UAV’s identity via the RA’s public key, generating a temporary identity and session key, and securely transmitting these to the UAV.
Figure 6 displays the outcomes of ProVerif’s analysis of our scheme. The results confirm that adversaries are unable to access key parameters necessary for session key computation. As a result, our proposed scheme is validated as secure.

6. Performance Comparison

This section presents a detailed performance evaluation of our proposed scheme, focusing on computation, communication, and security aspects. It is benchmarked against significant existing works, namely Kumar et al. [16], Son et al. [17], Kwon et al. [20], and the Babu et al. approach [19].

6.1. Computation Cost

To compare computational costs, Table 6 provides a detailed analysis, contrasting our proposed scheme with the aforementioned studies. This assessment was conducted on a personal computer equipped with an Intel(R) (Intel, Santa Clara, CA, USA) Core(TM) i5-1035G1 CPU @ 1.00 GHz (1.19 GHz), 16.0 GB RAM, and a Windows 10 64-bit operating system. The evaluation measures the computation times for cryptographic one-way hash functions, elliptic curve point operations, and bilinear pairing functions, recorded as T h , T m , and T b , respectively. These times are 0.056 milliseconds for T h , 2.806 milliseconds for T m , and 6.892 milliseconds for T b .
Our scheme primarily focuses on handover authentication overhead, as the initial authentication occurs only once. In this context, the computation cost for a UAV in our scheme is 5 T h , and for GSS nodes, it is 9 T h . The total computation cost thus approximates to 5 T h + 9 T h 0.784 milliseconds. In contrast, the total computation costs for the approaches in Kumar et al. [16] and Son et al. [17] are approximately 40.654 milliseconds and 0.84 milliseconds, respectively. The schemes by Kwon et al. [20] and the Babu et al. approach [19] require about 12.344 milliseconds and 1.568 milliseconds, respectively. Figure 7 visually represents these findings. A comparative analysis highlights the lower computational overhead of our proposed scheme relative to its counterparts.

6.2. Communication Cost

The communication costs of the proposed scheme were evaluated during the authentication phase, Table 7 provides a detailed analysis. We assumed the following sizes for various elements: timestamps, identities, and random numbers at 32 bits, 160 bits, and 160 bits respectively, encryption/decryption processes at 256 bits; and hash function outputs at 256 bits. The elliptic curve point size P = (Px, Py) was considered to be 320 bits. In the UAV authentication phase, a UAV and a GSS exchange two messages, with sizes detailed as follows: M s g 1 = { T I D i , M 7 , M 8 , M 9 , T 3 } = ( 256 + 256 + 256 + 256 + 32 ) = 1056 bits and M s g 2 = { M 10 , M 11 , M 12 , T 4 } = ( 256 + 256 + 256 + 32 ) = 800 bits. The total communication cost thus amounts to 1056 + 800 = 1856 bits.
For comparison, the communication costs in the schemes of Kumar et al. [16], Son et al. [17], Kwon et al. [20], and the Babu et al. approach [19] are 3200 bits, 2112 bits, 2560 bits, and 2784 bits, respectively. Figure 8 visually compares the proposed scheme’s communication overhead with these other schemes, highlighting that the proposed scheme is competitive in terms of communication costs.

6.3. Security Features

Table 8 offers a comprehensive analysis of the security functionalities comparing our newly developed protocol with earlier versions. This assessment underscores critical security aspects, such as “Mutual Authentication”, “Impersonation Attack Resistance”, “Replay Attack Defense”, “Protection against Device Physical Capture”, “Mitigation of Man-In-The-Middle (MITM) Attacks”, “Ensuring Anonymity and Untraceability”, and “Guaranteeing Perfect Forward Secrecy”. As elaborated in Section 4, our protocol not only incorporates these security measures but also surpasses in their practical application. In contrast, the previously established protocols [16,17,20], and [19] either overlook these critical security dimensions or are inadequate in their assurance. Our protocol, by catering to a broader spectrum of potential threats in wireless channels, significantly bolsters security over the existing models.

7. Conclusions

In this paper, we developed and introduced a lightweight secure handover authentication protocol tailored for UAV applications. This protocol incorporates an initial authentication phase when a UAV enters a GSS domain and efficiently uses information from previous authentications to streamline the authentication process during transitions to subsequent GSS domains. This strategy significantly optimizes operational efficiency in dynamic environments for UAVs. The protocol demonstrates exceptional resistance to a variety of security threats, including UAV hijacking, identity spoofing, and replay attacks, thereby underscoring its reliability in securing UAV communications. The security and robustness of our protocol have been rigorously validated using the ROR model and the ProVerif tool. Moreover, our comprehensive performance analysis shows that our protocol surpasses existing solutions in significantly reducing computational and communication overheads, reflecting its specialized optimization for UAV scenarios.
The impact of our work extends beyond the direct benefits of improved authentication efficiency and security. By addressing the unique challenges of UAV handover scenarios, our protocol contributes to broader efforts to enhance the integrity of UAV operations in increasingly complex airspace environments. This research not only lays a solid foundation for safer and more efficient UAV deployments but also provides important insights for future studies on advanced authentication mechanisms, further refining UAV communication and operation protocols.

Author Contributions

Conceptualization, K.W. and S.W.; methodology, K.W. and Y.W.; software, K.W. and J.W.; validation, K.W., S.W. and L.H.; formal analysis, K.W. and Q.X.; investigation, K.W. and S.W.; resources, K.W., S.W. and J.W.; writing—original draft preparation, K.W. and S.W.; writing—review and editing, K.W. and S.W.; visualization, K.W. and L.H.; supervision, S.W. and Q.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant U21A20466 and the Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China under Grant No. LHZSZ24F020002.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
R I D Identity of R A
U A V i i-th UAV
U I D i Identity of U A V i
P I D i Pseudo-identity of U A V i
G S S i i-th GSS
G I D i Identity of G S S i
E p ( a , b ) An elliptic curve
PGenerator of G
T I D i Temporary identity of U A V i
P K R A , S K S A Public key and private key of RA
S K i t Session key of U A V i and G S S i
S K G S S i Private keys of G S S i
P K G S S i Public keys of G S S i
G e n ( . ) The generating function of Fuzzy extractor
R e p ( . ) The reproduction function of Fuzzy extractor
P U F ( ) Physical unclonable function
b i o i The biological information of user
σ i , τ i Biological key and auxiliary parameter
c h a i , r e s i The challenge and response of the PUF in C S i
n i , n j Random nonces
T * Timestamp
h ( · ) One-way hash function
Exclusive OR operation

References

  1. Ozdemir, U.; Aktas, Y.O.; Vuruskan, A.; Dereli, Y.; Tarhan, A.F.; Demirbag, K.; Erdem, A.; Kalaycioglu, G.D.; Ozkol, I.; Inalhan, G. Design of a commercial hybrid VTOL UAV system. J. Intell. Robot. Syst. 2014, 74, 371–393. [Google Scholar] [CrossRef]
  2. Samir Labib, N.; Danoy, G.; Musial, J.; Brust, M.R.; Bouvry, P. Internet of Unmanned Aerial Vehicles—A multilayer low-altitude airspace model for distributed UAV traffic management. Sensors 2019, 19, 4779. [Google Scholar] [CrossRef] [PubMed]
  3. Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3417–3442. [Google Scholar] [CrossRef]
  4. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with Unmanned Aerial Vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef]
  5. Baek, H.; Lim, J. Design of future UAV-relay tactical data link for reliable UAV control and situational awareness. IEEE Commun. Mag. 2018, 56, 144–150. [Google Scholar] [CrossRef]
  6. Zhi, Y.; Fu, Z.; Sun, X.; Yu, J. Security and privacy issues of UAV: A survey. Mob. Netw. Appl. 2020, 25, 95–101. [Google Scholar] [CrossRef]
  7. Gharibi, M.; Boutaba, R.; Waslander, S.L. Internet of Drones. IEEE Access 2016, 4, 1148–1162. [Google Scholar] [CrossRef]
  8. Deebak, B.D.; Al-Turjman, F. A smart lightweight privacy preservation scheme for IoT-based UAV communication systems. Comput. Commun. 2020, 162, 102–117. [Google Scholar] [CrossRef]
  9. Alladi, T.; Bansal, G.; Chamola, V.; Guizani, M. SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Trans. Veh. Technol. 2020, 69, 15068–15077. [Google Scholar] [CrossRef]
  10. Cho, G.; Cho, J.; Hyun, S.; Kim, H. SENTINEL: A secure and efficient authentication framework for Unmanned Aerial Vehicles. Appl. Sci. 2020, 10, 3149. [Google Scholar] [CrossRef]
  11. Jan, S.U.; Qayum, F.; Khan, H.U. Design and Analysis of Lightweight Authentication Protocol for Securing IoD. IEEE Access 2021, 9, 69287–69306. [Google Scholar] [CrossRef]
  12. Zhang, Y.; He, D.; Li, L.; Chen, B. A lightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 2020, 154, 455–464. [Google Scholar] [CrossRef]
  13. Chaudhary, D.; Soni, T.; Vasudev, K.L.; Saleem, K. A modified lightweight authenticated key agreement protocol for Internet of Drones. Internet Things 2023, 21, 100669. [Google Scholar] [CrossRef]
  14. Hussain, S.; Chaudhry, S.A.; Alomari, O.A.; Alsharif, M.H.; Khan, M.K.; Kumar, N. Amassing the security: An ECC-based authentication scheme for Internet of drones. IEEE Syst. J. 2021, 15, 4431–4438. [Google Scholar] [CrossRef]
  15. Zhang, M.; Xu, C.; Li, S.; Jiang, C. On the Security of an ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 2022, 16, 6425–6428. [Google Scholar] [CrossRef]
  16. Kumar, A.; Om, H. Handover authentication scheme for device-to-device outband communication in 5G-WLAN next generation heterogeneous networks. Arab. J. Sci. Eng. 2018, 43, 7961–7977. [Google Scholar] [CrossRef]
  17. Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
  18. Tu, S.; Waqas, M.; Rehman, S.U.; Aamir, M.; Rehman, O.U.; Jianbiao, Z.; Chang, C.C. Security in fog computing: A novel technique to tackle an impersonation attack. IEEE Access 2018, 6, 74993–75001. [Google Scholar] [CrossRef]
  19. Babu, P.R.; Reddy, A.G.; Palaniswamy, B.; Das, A.K. EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3791–3807. [Google Scholar] [CrossRef]
  20. Kwon, D.; Son, S.; Park, Y.; Kim, H.; Park, Y.; Lee, S.; Jeon, Y. Design of secure handover authentication scheme for urban air mobility environments. IEEE Access 2022, 10, 42529–42541. [Google Scholar] [CrossRef]
  21. Khalid, H.; Hashim, S.J.; Hashim, F.; Ahamed, S.M.S.; Chaudhary, M.A.; Altarturi, H.H.; Saadoon, M. HOOPOE: High Performance and Efficient Anonymous Handover Authentication Protocol for Flying Out of Zone UAVs. IEEE Trans. Veh. Technol. 2023, 72, 10906–10920. [Google Scholar] [CrossRef]
  22. Ren, X.; Cao, J.; Ma, R.; Luo, Y.; Guan, J.; Zhang, Y.; Li, H. A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. IEEE Trans. Netw. Serv. Manag. 2023, 20, 3880–3899. [Google Scholar] [CrossRef]
  23. Cervesato, I. The Dolev-Yao intruder is the most powerful attacker. In Proceedings of the 16th Annual Symposium on Logic in Computer Science—LICS. Citeseer, Boston, MA, USA, 16–19 June 2001; Volume 1, pp. 1–2. [Google Scholar]
  24. Ku, W.C.; Chang, S.T. Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Trans. Commun. 2005, 88, 2165–2167. [Google Scholar] [CrossRef]
  25. Chaudhry, S.A.; Nebhen, J.; Irshad, A.; Bashir, A.K.; Kharel, R.; Yu, K.; Zikria, Y.B. A physical capture resistant authentication scheme for the internet of drones. IEEE Commun. Stand. Mag. 2021, 5, 62–67. [Google Scholar] [CrossRef]
Figure 1. Systematic architecture of proposed scheme.
Figure 1. Systematic architecture of proposed scheme.
Mathematics 12 00716 g001
Figure 2. Definition and function declaration.
Figure 2. Definition and function declaration.
Mathematics 12 00716 g002
Figure 3. Events and queries.
Figure 3. Events and queries.
Mathematics 12 00716 g003
Figure 4. UAV authentication process.
Figure 4. UAV authentication process.
Mathematics 12 00716 g004
Figure 5. GSS authentication process.
Figure 5. GSS authentication process.
Mathematics 12 00716 g005
Figure 6. Results.
Figure 6. Results.
Mathematics 12 00716 g006
Figure 7. Comparison of computation cost.
Figure 7. Comparison of computation cost.
Mathematics 12 00716 g007
Figure 8. Comparison of communication cost.
Figure 8. Comparison of communication cost.
Mathematics 12 00716 g008
Table 1. GSS registration phase.
Table 1. GSS registration phase.
GSS i RA
Chooses G I D i
Secure channel { G I D i }
Verify the uniqueness of G I D i
Select b i
Calculates S K G S S i = h ( G I D i | | S K R A | | b i )
P K G S S i = S K G S S i · P
k = h ( R I D | | S K R A )
Stores ( G I D i , b i ) in secure memory
Secure channel { k , S K G S S i }
Generates a challenge C h a i
R e s i = P U F ( C h a i )
Y i = S K G S S i h ( G I D i | | R e s i )
V i = k h ( G I D i | | S K G S S i )
Stores { Y i , V i , C h a i }
Table 2. UAV registration phase.
Table 2. UAV registration phase.
UAV i RA
Chooses U I D i
Secure channel { U I D i }
Verify the uniqueness of U I D i
Selects a i
Calculates A i = a i · P
P I D i = h ( U I D i | | A i )
d i = a i + P I D i · S K R A
Stores ( U I D i , a i ) in secure memory
Secure channel { A i , d i }
Computes P I D i = h ( U I D i | | A i )
Verify d i · P = ? A i + P I D i · P K R A
Input B i o i
G e n ( B i o i ) = ( σ i , τ i )
F i = A i h ( σ i )
G i = d i h ( A i | | P I D i )
H i = h ( A i | | d i | | P I D i )
Stores ( F i , G i , H i , R e p ( · ) )
Table 3. UAV initial authentication phase.
Table 3. UAV initial authentication phase.
UAV i GSS i
Input B i o i *
σ i * = R e p ( B i o i * , τ i )
A i * = h ( σ i * ) F i
P I D i * = h ( U I D i | | A i * )
Computes d i * = G i h ( A i * | | P I D i * )
Checks H i = ? h ( A i * | | d i * | | P I D i * )
Generates c i and T 1
P i t = c i · P K G S S i
P i = c i · P
W 1 = P I D i h ( G I D i | | P i t )
W 2 = d i h ( P I D i | | T 1 | | P i t )
W 3 = h ( P I D i | | d i | | A i | | P i t | | T 1 )
( W 1 , W 2 , W 3 , P i , T 1 )
Checks T 1
R e s i = P U F ( C h a i )
S K G S S i = Y i h ( G I D i | | R e s i )
Computes P i t = S K G S S i · P i
P I D i = W 1 h ( G I D i | | P i t )
d i = W 2 h ( P I D i | | T 1 | | P i t )
Calculates A * = d i · P P I D · P K R A
Checks W 3 = ? h ( P I D i | | d i | | A * | | P i t | | T 1 )
Generates e i , n i and T 2
K i t = e i · P i
K i = e i · P
T I D i = P I D i h ( n i )
W 4 = T I D i h ( K i t | | P I D i )
S K i t = h ( K i t | | P I D i | | T I D i )
k = V i h ( G I D i | | S K G S S i )
Q i = h ( T I D i | | k )
W 5 = Q i h ( K i t )
W 6 = h ( S K i t | | Q i | | T 2 )
( W 4 , W 5 , W 6 , K i , T 2 )
Checks T 2
Computes K i t = c i · K i
T I D i = W 4 h ( K i t | | P I D i )
Q i = W 5 h ( K i t )
S K i t = h ( K i t | | P I D i | | T I D i )
Checks W 6 = ? h ( S K i t | | Q i | | T 2 )
Table 4. UAV handover authentication phase.
Table 4. UAV handover authentication phase.
UAV i GSS j
Generates m i , T 3
Calculates
W 7 = h ( P I D i | | T I D i | | G I D j | | T 3 ) m i
W 8 = Q i P I D i
W 9 = h ( m i | | P I D i | | T I D i | | T 3 )
( T I D i , W 7 , W 8 , W 9 , T 3 )
Checks T 3
R e s j = P U F ( C h a j )
S K G S S j = Y j h ( G I D j | | R e s j )
k = V j h ( G I D j | | S K G S S j )
Computes P I D i * = W 8 h ( T I D i | | k )
m i * = W 7 h ( P I D i * | | T I D i | | G I D j | | T 3 )
Checks W 9 = ? h ( m i | | P I D i * | | T I D i | | T 3 )
Generates e j , n j and T 4
Computes T I D j = P I D i h ( n j )
W 10 = T I D j h ( m i | | P I D i )
W 11 = e j h ( m i | | T I D j | | P I D i )
S K i j = h ( m i | | e j | | T I D j | | P I D i )
W 12 = h ( S K i j | | T 4 )
( W 10 , W 11 , W 12 , T 4 )
Checks T 4
Computes
T I D j = W 10 h ( m i | | P I D i )
e j = W 11 h ( m i | | T I D j | | P I D i )
S K i j = h ( m i | | e j | | T I D j | | P I D i )
Checks W 12 = ? h ( S K i j | | T 4 )
Table 5. Queries in ROR model.
Table 5. Queries in ROR model.
QueriesDescription
Execute( U i , G i ) A can obtain all publicly transmitted information between U i and G i .
Send( U i , G i , m)This query simulates an active attack. A can send messages to U i and G i , and obtain respective responses.
Reveal( U i , G i ) A can get the session keys between U i and G i .
Corrupt( U i , G i ) A can obtain the stored information { F i , G i , H i , R e p ( · ) } and { Y i , V i , C h a i } of U i and G i .
Test( U i , G i , r) A selects a session to launch a reveal query. This will generate a random number r. When r = 1 , the actual session key can be obtained by A ; when r = 0 , A will get a random number with the same length as the session key.
Table 6. Comparison of Computation Cost.
Table 6. Comparison of Computation Cost.
SchemeDeviceInfrastructureTotal Performed Operation
[16] 4 T m + 9 T h + 1 T b 3 T m + 2 T h + 2 T b 7 T m + 11 T h + 3 T b 40.654 ms
[17] 6 T h 9 T h 15 T h 0.84 ms
[20] 2 T m + 7 T h 2 T m + 13 T h 4 T m + 20 T h 12.344 ms
[19] 17 T h 11 T h 28 T h 1.568 ms
Proposed 5 T h 9 T h 14 T h 0.784 ms
Table 7. Comparison of Communication Cost.
Table 7. Comparison of Communication Cost.
SchemeNumber of Transmitting MessagesCommunication Overhead (in Bits)
[16]43200
[17]22112
[20]42560
[19]32784
Proposed21856
Table 8. Comparison of Security Features.
Table 8. Comparison of Security Features.
Security Features[16][17][20][19]Ours
Mutual Authentication
Impersonation Attack××
Replay Attack
Device Physical Capture Attack××××
MITM Attack
Anonymity and Untraceability
Perfect Forward Secrecy
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wen, K.; Wang, S.; Wu, Y.; Wang, J.; Han, L.; Xie, Q. A Secure Authentication Protocol Supporting Efficient Handover for UAV. Mathematics 2024, 12, 716. https://doi.org/10.3390/math12050716

AMA Style

Wen K, Wang S, Wu Y, Wang J, Han L, Xie Q. A Secure Authentication Protocol Supporting Efficient Handover for UAV. Mathematics. 2024; 12(5):716. https://doi.org/10.3390/math12050716

Chicago/Turabian Style

Wen, Kang, Shengbao Wang, Yixiao Wu, Jie Wang, Lidong Han, and Qi Xie. 2024. "A Secure Authentication Protocol Supporting Efficient Handover for UAV" Mathematics 12, no. 5: 716. https://doi.org/10.3390/math12050716

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop