Browse > Article
http://dx.doi.org/10.3745/KTSDE.2017.6.9.429

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links  

Kim, Man Sik (숭실대학교 컴퓨터학과)
Jun, Moon-Seog (숭실대학교 컴퓨터학과)
Kang, Jung Ho (숭실대학교 평생교육원 정보보안학과)
Publication Information
KIPS Transactions on Software and Data Engineering / v.6, no.9, 2017 , pp. 429-436 More about this Journal
Abstract
Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.
Keywords
UA; UAS; CNPC; Data Security; Drone;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 C. Drubin, "The Global UAV Market 2015-2025," Microw. J., Vol.58, No.3, pp.53-54, Mar., 2015.
2 Y. I. Bae and H. R. Shin, "Prerequisites for Drones Industry Development," Issue & Analysis, No.237, pp.1-25, 2016.
3 B. Canis, "Unmanned aircraft systems (UAS): Commercial outlook for a new industry," Congressional Research Service, Washington, 2015.
4 J. H. Jin and G. B. Lee, "Understanding and Trend of UAV / Dron," KICS, Vol.33, No.2, pp.80-85, 2016.
5 A. R. Lee, "Weekly Tip - Industry," CRPC, Vol.53, 2017.
6 J. H Lee, Y. T. Kim, J. Y. Seo, and S. J. Hwang, "2015 World Radiocommunication Conference (WRC-15)," TTP. J., Vol.163, pp.105-109, 2016.
7 A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, "Cyber security threat analysis and modeling of an unmanned aerial vehicle system," Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, pp.585-590, 2012.
8 N. M. Rodday, R. D. O. Schmidt, and A. Pras, "Exploring security vulnerabilities of unmanned aerial vehicles," Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, pp.993-994, 2016.
9 J. H. Kim, B. K. Kim, and Y. T Shin, "A Study on the Improvement of security vulnerabilities in Civilian Drone," KIISE, pp.1069-1071, 2016.
10 C. A. Gomez, "Cybersecurity of unmanned aircraft systems (UAS)," Diss. UTICA COLLEGE, 2015.
11 S. J. Song and B. O. Kil, "A Study on the Glo UAV Market," KADIS, Vol.22, No.4, pp.49-76, 2015.
12 F. Schenkelberg, "How reliable does a delivery drone have to be?" Reliability and Maintainability Symposium (RAMS), 2016 Annual, IEEE, 2016.
13 H. W. Kim, K. S. Kang, D. I. Chang, J. Y. Ahn, "Technical and Standardization Trends on Control and Non-Payload Communications for Unmanned Aircraft Systems," ETRI, Vol.30, No.3, pp.74-83, 2015.
14 R. J. Kerczewski, and J. H. Griner, "Control and Non-Payload Communications Links for Integrated Unmanned Aircraft Operations," 2012.
15 Y. H. Kang, "An Efficient Frequency Utilization Policy for UAS in Hyper-Connectivity Era," The Journal of Korean Institute of Electromagnetic Engineering and Science, Vol.26, No.10, pp.914-923, 2015.   DOI
16 A. Studer, F. Bai, B. Bellur, and A. Perrig, "Flexible, extensible, and efficient VANET authentication," Journal of Communications and Networks, Vol.11, No.6, pp.574-588, 2009.   DOI
17 R. Maes, "Physically Unclonable Functions," Springer, Berlin, 2013.
18 G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," Proceedings of the 44th annual Design Automation Conference, ACM, 2007.
19 B. Jenkins, "Watching the Watchmen: Drone Privacy and the Need for Oversight," Ky. LJ, Vol.102, pp.161-182, 2013.
20 G., Wang, B. S. Lee, and J. Y. Ahn, "Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network," In Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on, IEEE, pp.355-360, Aug., 2016.
21 U. K. Verma, S. Kumar, and D. Sinha, "A secure and efficient certificate based authentication protocol for MANET," In Circuit, Power and Computing Technologies (ICCPCT), 2016 International Conference on, IEEE, pp.1-7, Mar., 2016.
22 J A. Kakar, "UAV communications: Spectral requirements, MAV and SUAV channel modeling, OFDM waveform parameters, performance and spectrum management," Diss. Virginia Tech, 2015.