About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings

Research Article

MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-15101-9_2,
        author={Zaid Ameen Abduljabbar and Vincent Omollo Nyangaresi and Junchao Ma and Mustafa A. Al Sibahee and Mustafa S. Khalefa and Dhafer G. Honi},
        title={MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones},
        proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings},
        proceedings_a={FABULOUS},
        year={2022},
        month={9},
        keywords={Authentication Drones Encryption MAC Protocol Privacy Symmetric UAV},
        doi={10.1007/978-3-031-15101-9_2}
    }
    
  • Zaid Ameen Abduljabbar
    Vincent Omollo Nyangaresi
    Junchao Ma
    Mustafa A. Al Sibahee
    Mustafa S. Khalefa
    Dhafer G. Honi
    Year: 2022
    MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones
    FABULOUS
    Springer
    DOI: 10.1007/978-3-031-15101-9_2
Zaid Ameen Abduljabbar1, Vincent Omollo Nyangaresi2, Junchao Ma3,*, Mustafa A. Al Sibahee3, Mustafa S. Khalefa1, Dhafer G. Honi1
  • 1: Department of Computer Science, College of Education for Pure Sciences, University of Basrah
  • 2: Faculty of Biological and Physical Sciences, Tom Mboya University
  • 3: College of Big Data and Internet, Shenzhen Technology University
*Contact email: majunchao@sztu.edu.cn

Abstract

Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between the operators and these aerial vehicles must be protected as any malicious access may lead to leakages and adversarial control of the drones. To achieve this, many schemes have been developed based on techniques such as blockchains, elliptic curve cryptography, dynamic keys, physically unclonable function, asymmetric and symmetric cryptography among others. However, majority of these protocols have been shown to be inefficient for deployment in this environment, while others have security holes that be exploited by attackers to cause mayhem in these networks. In this paper, a protocol that leverages on quadratic residues and Chinese remainder theorem is developed. Its security analysis shows that it offers mutual authentication, non-repudiation, unlinkability, identity privacy and traceability for misbehaving drones. It is also resilient against impersonation, forgery and replay attacks. In terms of performance, this protocol has the least execution time and relatively lower bandwidth requirements.

Keywords
Authentication Drones Encryption MAC Protocol Privacy Symmetric UAV
Published
2022-09-18
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-15101-9_2
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL