Browse > Article
http://dx.doi.org/10.9717/kmms.2018.21.8.897

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks  

Shin, Minjeong (Dept. of Information & Communication Eng., Graduate School, Pukyong National University)
Kim, Sungun (Dept. of Information & Communication Eng., Pukyong National University)
Publication Information
Abstract
In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.
Keywords
GCS (Ground Control Station); Unmanned Aerial Vehicle (UAV); Flying Ad-hoc Network (FANET); Micro Air Vehicle Link (MAVLink); Diffie-Hellman Key Exchange; Lightweight Encryption Algorithm (LEA); Encryption/Decryption; Security Tag;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y. Shiu, S. Y. Chang, H. Wu, S. C. H. Huang, and H. Chen, "Physical Layer Security in Wireless Networks: A Tutorial IEEE Wireless Communications," IEEE Wireless Communication, Vol. 18, No. 2, pp. 66-74, 2011.   DOI
2 A. Restas, "Drone Application for Supporting Disaster Management," World Journal of Engineering and Technology, Vol. 3, No. 3, pp. 316-321, 2015.   DOI
3 I. Bekmezci, O.K. Sahingoz, and S. Temel, "Flying Ad-Hoc Networks (FANETs): A survey," Ad Hoc Networks, Vol. 11, No. 3, pp. 1254-1270, 2013.   DOI
4 A.J. Marty, Vulnerability Analysis of the MAV Link Protocol for Command and Control of Unmanned Aircraft, Master's Thesis of Air Force Institute of Technology, 2013.
5 N. Prapulla, S. Veena, and G. Srinivasalu, "Development of Algorithms for MAV Security," Proceeding of IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 799-802, 2016.
6 IETF, Diffie-Hellman Key Agreement Method, RFC 2631, 1999.
7 M. Ergen and D. Lee, "WTRP-Wireless Token Ring Protocol," IEEE Transactions on Vehicular Technology, Vol. 54, No. 6, pp. 1863-1881, 2004.
8 D. Lee, D. C. Kim, D. Kwon, and H. Kim, "Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA," Sensors, Vol. 14, No. 1, pp. 975-994, 2014.   DOI
9 J.S. Coron, Y. Dodis, C. Malinaud, and P. Puniya, "Merkle-Damgard Revisited: How to Construct a Hash Function," Proceeding of Annual International Conference on Advances in Cryptology, pp. 430-448, 2005.
10 M. Shin and S. Kim, "A Study on the Security Framework for IoT Services Based on Cloud and Fog Computing," Journal of Korea Multimedia Society, Vol. 20, No. 12, 2017, pp. 101-112.   DOI