
Research Article
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones
@INPROCEEDINGS{10.1007/978-3-031-15101-9_2, author={Zaid Ameen Abduljabbar and Vincent Omollo Nyangaresi and Junchao Ma and Mustafa A. Al Sibahee and Mustafa S. Khalefa and Dhafer G. Honi}, title={MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones}, proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings}, proceedings_a={FABULOUS}, year={2022}, month={9}, keywords={Authentication Drones Encryption MAC Protocol Privacy Symmetric UAV}, doi={10.1007/978-3-031-15101-9_2} }
- Zaid Ameen Abduljabbar
Vincent Omollo Nyangaresi
Junchao Ma
Mustafa A. Al Sibahee
Mustafa S. Khalefa
Dhafer G. Honi
Year: 2022
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones
FABULOUS
Springer
DOI: 10.1007/978-3-031-15101-9_2
Abstract
Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between the operators and these aerial vehicles must be protected as any malicious access may lead to leakages and adversarial control of the drones. To achieve this, many schemes have been developed based on techniques such as blockchains, elliptic curve cryptography, dynamic keys, physically unclonable function, asymmetric and symmetric cryptography among others. However, majority of these protocols have been shown to be inefficient for deployment in this environment, while others have security holes that be exploited by attackers to cause mayhem in these networks. In this paper, a protocol that leverages on quadratic residues and Chinese remainder theorem is developed. Its security analysis shows that it offers mutual authentication, non-repudiation, unlinkability, identity privacy and traceability for misbehaving drones. It is also resilient against impersonation, forgery and replay attacks. In terms of performance, this protocol has the least execution time and relatively lower bandwidth requirements.