• 
    

    
    

      99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

      Efficient Remote Identification for Drone Swarms

      2023-10-26 13:13:36KangMoonSeoJaneKimSoojinLeeJunWooKwonandSeungHyunSeo
      Computers Materials&Continua 2023年9期

      Kang-Moon Seo ,Jane Kim ,Soojin Lee ,Jun-Woo Kwon and Seung-Hyun Seo,2,?

      1The Department of Electronic&Electrical Engineering,Graduate School,Hanyang University,Ansan,Korea

      2School of Electrical Engineering,Hanyang University ERICA,Ansan,Korea

      ABSTRACT With the advancement of unmanned aerial vehicle(UAV)technology,the market for drones and the cooperation of many drones are expanding.Drone swarms move together in multiple regions to perform their tasks.A Ground Control Server(GCS)located in each region identifies drone swarm members to prevent unauthorized drones from trespassing.Studies on drone identification have been actively conducted,but existing studies did not consider multiple drone identification environments.Thus,developing a secure and effective identification mechanism for drone swarms is necessary.We suggested a novel approach for the remote identification of drone swarms.For an efficient identification process between the drone swarm and the GCS,each Reader drone in the region collects the identification information of the drone swarm and submits it to the GCS for verification.The proposed identification protocol reduces the verification time for a drone swarm by utilizing batch verification to verify numerous drones in a drone swarm simultaneously.To prove the security and correctness of the proposed protocol,we conducted a formal security verification using ProVerif,an automatic cryptographic protocol verifier.We also implemented a non-flying drone swarm prototype using multiple Raspberry Pis to evaluate the proposed protocol’s computational overhead and effectiveness.We showed simulation results regarding various drone simulation scenarios.

      KEYWORDS Drone remote identification;drone swarms;multi-drone authentication

      1 Introduction

      Drone applications have recently expanded in fields such as agriculture,transportation,construction,and topographic exploration.As the number of studies in which Internet of Things(IoT)devices collaborate and perform tasks in groups increases[1–8],the development of drone swarms,in which multiple drones collaborate in large teams to accomplish a specific task or set of tasks,also has been actively pursued.The drone swarm can overcome the limitations of individual drones,which generally include constrained resources,such as battery life,flight time,and coverage area.In 2020,researchers at Imperial College London developed a new control system for drone swarms that allows drones to make decisions and adjust their behavior based on the behavior of other drones in the swarm[9].The US Navy announced the successful test of a drone swarm that can protect ships and other vessels[10].In 2021,Researchers at ETH Zurich developed a system that allows a drone swarm to work together to transport a heavy payload,such as a package or a piece of equipment,from one location to another[11].These drone swarms are expected to be effectively used for a wide range of applications,such as search and rescue,mapping,military operations,and surveillance.

      However,drone flight-related accidents such as invasion of personal privacy,access to no-fly zones,and drone crashes have also become frequent.In 2018,two unidentified drones appeared at Gatwick Airport in the UK,so the runway was shut down[12].In 2019,two oil production facilities in Saudi Arabia were also bombed using drones[13].As drone accident cases and illegal use increase,the need to accurately identify the source of drones has been raised.Currently,the authorities of each country,including the Federal Aviation Administration(FAA)[14]and the European Union Aviation Safety Agency(EASA)[15],and the Ministry of Land,Infrastructure,Transport and Tourism(MLIT)of Japan [16] are working to come up with rules on drone remote identification.“Digital License Plates”for drones are being considered a possible drone remote identification method.

      Remote identification of drones would mean the drone’s functionality could provide information such as identification and location of the drones in flight to people on the ground or other airspace users.Identifying a drone and a drone swarm is essential for many reasons.One of the main reasons is safety.Suppose a drone swarm is operating in an area where there are other aircraft or people.In that case,it is crucial to identify the drones and track their movements to prevent collisions or other accidents.Another reason is to maintain security.Drones can potentially be used for malicious purposes such as espionage or smuggling.Identifying the drones in a swarm can help authorities to track and intercept them if they are being used for illegal activities.Remote identification makes it easier to distinguish between licensed users who comply with drone flight rules and potentially malicious users who pose security risks.

      Furthermore,drones are not capable of long-distance flights with limited capacity batteries,so it is necessary to route to intermediate landing spots for long distances.The ground control server that monitors each landing spot base must quickly identify the drone that comes to the base station and verify its authenticity.In the case of drones that have passed unauthorized places,such as no-fly zones,tracking the travel path of the drones is necessary[17].Identifying a drone swarm can also be helpful for managing and coordinating the drones.For example,suppose a swarm is being used for search and rescue operations.In that case,it is crucial to be able to identify each drone in order to direct them to specific areas or to retrieve data from them.

      These reasons make it necessary to develop a remote identification system for drones,including drone swarms.There have been numerous works on drone identification and authentication methods[18–25],but only a few on authentication methods for drone swarms [26–30].Also,there is still no effective method of identification for drone swarms.Unfortunately,it is challenging for the ground control server to recognize a drone swarm effectively.Developing a method to identify drone swarms before they perform tasks effectively should be ongoing.In this paper,we propose a remote identification protocol for efficiently identifying drone swarms and verifying their access authorization.Our protocol utilizes a Reader drone (Rdrone) to supervise each airspace region and efficiently read the Remote IDs of the drone swarm coming to the region.TheRdronerefers to a drone equipped with a device that enables it to read the remote ID of drones and identify drones in the airspace above the base station.In general,drones broadcast remote IDs through Bluetooth or Wi-Fi with limited communication distance,so drones must closely approach the ground control server of the base station.However,it can be challenging to access ground control servers closely to identify drone IDs in a complex downtown area with obstacles.Therefore,we introduce theRdronefor each area to effectively identify remote IDs of a drone swarm and transmit gathered messages from each drone to a ground control server.

      The gathered message is a grouping proof that is evidence to the ground control server(verifier)that the identities(IDs)of the authorized swarm drones were simultaneously in a range of theRdrone.In our proposed protocol,a ground control server (verifier) can efficiently extract from the proof evidence of the presence of each drone ID in the swarm drones and verify their access authorization by using the batch verification technique.We conducted a formal security verification to prove the proposed scheme’s correctness and security by utilizing ProVerif [31].Through formal security verification,we verify the secrecy of the group session key and the authenticity of the message sent by the drone swarm and theRdronein the presence of a malicious attacker.Moreover,in order to evaluate the computational overhead of the proposed protocol in a wireless communication environment,we built a non-flying prototype for a drone swarm by using multiple Raspberry Pis and measured each phase’s processing time.We also compared the computational overhead of the proposed protocol with related schemes and showed that it is more efficient in verifying drone swarm members’ID as the drone swarm size increases than other existing schemes.In addition,we simulated the proposed protocol using the Omnet++simulator [32] to analyze the performance of the drone swarm identification considering the drone swarm environment with many drone swarms of various sizes.We analyzed the verification time according to the number ofRdronesand the size of the drone swarm.We also suggested the appropriate operation interval between drone swarms when there are multiple drone swarms by simulating a drone swarm scheduling scenario.The remainder of the paper is organized as follows.Section 2 introduces a remote identification rule and the related work.In Section 3,we present our system model and an adversary model.We propose a remote drone swarm identification protocol in Section 4,and we provide security analysis and formal verification of the proposed scheme in Section 5.In Section 6,we evaluate the performance of our proposed scheme.Section 7 concludes this paper.

      2 Related Works

      In this section,we explain a remote identification rule and related works of drone swarm authentication protocol.

      2.1 Remote Identification Rule

      In December 2019,the US Federal Aviation Administration(FAA)issued guidelines for solving safety/security problems for unmanned aerial vehicles[14].After that,from April 2021,the final rules for remote drone identification took effect and were implemented.The user must use the Standard Remote ID Drone or attach the Remote ID broadcast module to the drone.The FAA made it possible to identify and locate the ID of a drone in flight using the Remote ID.Some FAA-approved areas allow drones to operate without a Remote ID,but most areas require Remote IDs containing information about drones and control stations to comply with Remote ID rules.

      According to the FAA,whether using a Standard Remote ID Drone or a remote ID broadcast module,the message elements must be broadcast from take-off to shut down.A Standard Remote ID Drone or a drone with a remote ID broadcast module must transmit the following message elements[14].

      ? A unique identifier for the drone

      ? The drone’s latitude,longitude,geometric altitude,and velocity

      ? An indication of the latitude,longitude,and geometric altitude of the control station(standard)of the take-off location(broadcast module)

      ? A time mark

      ? Emergency status(Standard Remote ID Drone only)

      The European Union Aviation Safety Agency (EASA) announced operational procedures and rules according to specifications to identify drones in May 2019 and is making efforts to respond to the standardization of illegal drones[15].The EASA is considering Direct Remote ID,a broadcasttype remote identification method,as a drone remote identification method.The EASA plans to use Direct Remote ID for the purpose of drone security.Related content is contained in UAS Regulation(EU) 2019/945 and 947,which addresses design and manufacturing requirements for drone systems in Europe and rules on drone operations.According to this rule,in the case of drones corresponding to Classes 5 and 6,it is mandatory to install Direct Remote ID.Before the operation of the system,the pilot is required to ensure that the Direct Remote ID system is active and up to date.Information that must be transmitted from Direct Remote ID includes operator registration information,dronespecific serial number,topographic drone location,flight guard,and pilot location or take-off location information.

      The Ministry of Land,Infrastructure,Transport and Tourism(MLIT)[16]of Japan is planning to implement a drone registration rule on June 20,2022.Drone users are required to attach a‘Remote ID’that transmits information such as registration number during drone flights.After June 2022,drones will be produced with a Remote ID attached.

      2.2 ECC-Based IoT Edge Device Authentication Protocol

      Several studies have recently been conducted on authentication protocols between IoT edge devices,such as drones,robots,and authentication servers in IoT environments [6–8].The previous works utilized ECC (Elliptic Curve Cryptography)-based authentication for resource-constraint devices [7].Rostampour et al.[6] proposed a new ECC-based authentication protocol for ensuring secure communication between cluster servers and IoT edge devices.The authors masked the embedded device’s unique identifier and used a random value to prevent a traceability attack.Kwon et al.[8]proposed mutual authentication and handover authentication for an unmanned aerial vehicle(UAV).A zone service provider in each region supports a handover process.Jain et al.[7] suggested a robot access control protocol by designing ECC-based mutual authentication between robots and cloud servers.The authors reduced the robot’s computation power and proved that their protocol is resistant to several attacks,such as a Man-in-the-middle attack and a forgery attack.However,existing authentication protocols are inefficient in terms of computational cost when verifying multiple devices’identities,as they only consider the authentication of a single device.

      2.3 Drone Swarm Authentication Protocol

      Recently,as the need for drone swarms has increased,studies on drone swarms,such as drone swarm formation[33],drone swarm allocation[34],and drone swarm application[35–37],have been conducted.Since a drone swarm is a very recent development(within the last two to three years),there are few studies on drone swarm authentication or key distribution.Moreover,there have yet to be considered drone swarm identification.In this section,we introduce some examples of recent drone swarm authentication protocols.Ardin et al.[26,27]proposed a group authentication and handover solution for drone swarms in 2021.Their protocol allows a new drone to join an existing drone swarm by using a guard drone,but it does not take into account drones leaving the drone swarm.However,if drones inevitably leave the drone swarm,such as when drones fail or battery power is lost,the drone leaving process,such as establishing a new group key,must be considered.

      Abdel-Malek et al.[28] proposed a distributed delegation-based authentication mechanism for overcoming drone resource limitations and scalability.The proposed method can reduce traffic overhead from the 5G core network.Moreover,when a failure or compromise to the leader drone occurs,a new leader drone can be assigned without interrupting the drone swarm communication.However,the PKI (Public Key Infrastructure)-based proxy signature solution requires significant computational overhead when authenticating many drones in the swarm.Han et al.[29] proposed an authentication protocol that enables mutual authentication between fog and edge without a ground station.The proposed method is effective against MITM(Man in the Middle Attack)attacks and replay attacks.Moreover,since it utilizes security functions with various hardware,it is more computationally efficient than the PKI-based approaches.However,it does not cover the compromised drone issue,and it requires special hardware.Han et al.[30]proposed a blockchain-based UAV swarm identity management model (B-UIM-M).The proposed method has advantages in UAV identity management,UAV identity authentication,scalability,and secure transmission of communication data.However,the blockchain operation causes a communication bottleneck between drones which are consensus nodes.

      3 System Model

      In this section,we describe the overall and adversary models of our proposed remote identification protocol for drone swarms.

      3.1 Overall Model

      The proposed model consists of five components: UAV Traffic Management (UTM),Base stations,Ground Control Servers(GCSs),Reader drones(Rdrones),and Drone swarms.The following is a description of each component in depth.Fig.1 shows the overall system model.A base station and a GCS are located in each region.The GCS verifies the identity of the drone swarm that enters the region to prevent unauthorized drones from gaining access.ARdroneflies around each GCS and directly communicates with the drone swarm to support the drone swarm identification of the GCS.Depending on the drone swarm’s flight schedule,single or multiple drone swarms can visit each region simultaneously.The main entities are defined as follows.

      ?UAV Traffic Management (UTM):The UTM is a system that manages the traffic of a drone swarm.The UTM is responsible for the management of drones throughout each region using base stations and GCSs.Before flying,the drone swarm should inform the flight route,including the list of the drone swarm ID,regions to visit,and flight time slots to the UTM.The UTM shares registered flight information with servers on the flight route.

      ?Base Station:The base station is a communication infrastructure to facilitate communication between entities in each region.The base station connects the wireless communication network and the entities such asRdrones,drone swarms,and GCSs in each region.

      ?Ground Control Server(GCS):The GCS in each region has the role of verifying the identification of drone swarms joining its region for access control.It receives flight-related information from the UTM before flying.For drone swarm verification,the server gets the collected drones’authentication information from theRdroneand conducts the verification process.

      ?Reader Drone(Rdrone):ARdroneexists in each region,and the number ofRdronesvaries by region.TheRdroneacts as an intermediary between the drone swarm and the GCS.TheRdroneflies to the airspace of its region and checks whether the incoming drone swarm is registered for flight in the region.Once theRdronereceives identification data from all drone swarm drones,it delivers the data to the GCS.We assume that the GCS continuously monitors theRdroneso that it can detect and defend against the malicious behavior of theRdrone.So,we let theRdronebe an honest entity like a GCS in our system model.

      ?Drone Swarm:A drone swarm is a group of drones that move and work together for a particular purpose,such as data collection and reconnaissance.It is assumed that each drone in the drone swarm has enough processing power to compute cryptographic operations such as symmetric and asymmetric encryption.

      We assume that the drones used in the proposed protocol meet the FAA’s remote identification requirements.The drone controller creates several drones as a swarm and pre-registers the swarm’s movement path in the UTM.Following that,when the registered drone swarm moves along the registered route,a GCS is present in each region and performs remote identification of drones passing through the region.Through the group session key and remote ID,the GCS verifies that each drone in the drone swarm is a part of the drone swarm registered to fly in advance.TheRdroneidentifies the drone swarm and collects authentication data from the drone swarm,and then transmits it to the GCS.The drone swarm is identified using our proposed protocol,and the GCS verifies the drone swarm based on the authentication data received from theRdrone.The GCS also examines the number of drones in the drone swarm.If the number of drone swarm members is less than that of UTM members,it generates a new group session key and shares it with the drone swarm via our group session key update phase.

      Figure 1:Overall system model

      3.2 Adversary Model

      The adversarial attackers in the proposed protocol can be classified as a malicious drone or a malicious drone swarm.A malicious drone may try to disguise itself as a member of a drone swarm attempting to access the area to gain access to the area he wishes to enter.A malicious drone swarm may attempt to access a location that has not previously registered with the UTM.Alternatively,a drone not previously registered may attempt to join the drone swarm.We assume that an attacker can listen in on the communication channel between the drone and theRdroneor theRdroneand the GCS.Furthermore,we assume that the attackers understand the cryptographic protocol used by the drone swarm so that it can generate private-public key pairs and mimic the transmitted messages through the drone swarm’s authentication protocol.Malicious drones are also assumed to have unique IDs.

      ? Impersonation attack: Malicious drones may attempt to impersonate members of a specific drone swarm.They may attempt to participate in the authentication process by generating fake IDs or keys while theRdroneauthenticates the drone swarm.On the other hand,a malicious drone swarm may attempt to disguise a malicious drone as a member of the drone swarm by sharing its group session key.

      ? Replay attack:A malicious drone or drone swarm can reuse information used to authenticate in the past without prior permission.A malicious drone can also attempt to access a location other than a UTM-registered route by using expired information.

      ? Eavesdropping attack:A malicious attacker may collect communication information between a drone swarm and aRdronevia an open channel.Eavesdropping information can be used to gain access to the area.It can also attempt to steal drone IDs based on eavesdropping data or expose group session keys used by drone swarm members.

      4 Remote Identification Protocol for Drone Swarms

      In this section,we propose a protocol for remote identification via aRdroneto allow the GCS in each region to access only the allowed drone swarm.Fig.2 shows the overall process of the proposed protocol.The protocol consists of five phases:Setup,Flight Registration,Remote ID Identification,Batch Verification,and Drone Leaving.The notations used in the proposed protocol are defined in Table 1.

      4.1 Setup Phase

      In the Setup Phase,each drone of the drone swarm and theRdronesgenerate Elliptic Curve Cryptographic(ECC)-based public/private key pairs to be used in the proposed protocol.Each drone,which belongs to a drone swarm,generates a private-public key pair,andRdronesalso generate its private-public key pair.LetEbe an elliptic curve defined over a finite fieldwhereqis a prime number.ThePis a generator of the G,which is an addictive cyclic group of points on the elliptic curveE.We assume that the generated public keys of all participants are propagated in the network.TheDroneiand theR droneperform the following steps:

      Figure 2:Proposed protocol

      Table 1:List of notations

      4.2 Flight Registration Phase

      Drone swarms register their flight route with the UTM.Then,each drone in the drone swarm generates an ephemeral private-public pair for each region it will visit.The UTM shares drone swarm flight information with the GCS in each region,as well as generates and distributes the drone swarm’s group session keys.The detailed process is as follows.

      -The UTM generates a random number which is used as a group session keygkSfor each drone swarm and broadcasts to the drone swarm and the GCS in the drone swarm’s path.

      4.3 Remote ID Identification Phase

      4.4 Batch Verification Phase

      4.5 Group Session Key Update

      In the case of drones,sudden battery shortages or discharge can result in a falling situation.Furthermore,unexpected sensor failures can result in situations where the mission is not normally carried out,or environmental factors can cause deviations from the drone swarm.Because the drone that left at this time is no longer a member of the drone swarm,the group session key for the newly changed member of the drone swarm must be updated.The GCS updates the group session key and shares it with the drone swarm once it confirms that the members of the drone swarm have been changed through the batch verification step.The following are the detailed group session key update steps.

      5 Security Analysis and Formal Verification

      In this section,we provide a security analysis of the proposed scheme.We also demonstrate the security of the proposed scheme through formal verification using ProVerif.

      5.1 Security Analysis

      Resistance against impersonation attack:A malicious drone might pretend to be a member of one of the drone swarms.However,the malicious drone does not know the shared secret keygkS,so it could not generate a validMAC.Moreover,if the malicious drone tries to use another drone’s ID in the identification process,it does not know the corresponding private key to another drone’s ID.Thus,it is impossible for the malicious drone to generate a valid signatureB.As a result,it fails to succeed in the impersonation attack.Also,a malicious drone might generate several fake IDs of drones that do not exist in the region and make them pass the identification process.However,as the drone swarm shares its flight route and IDs with theRdrone,theRdronecan check whether each drone’s ID was registered or not.As a result,our proposed protocol can prevent the impersonation attack.

      Resistance against replay attack:A malicious drone that left the drone swarm might attempt to enter the areaαby using the,gkS.If the member of the drone swarm is changed,the GCS updates the group session keygkSto the.The GCS also shares an updated list of the drone swarm with other GCSs.Since the left drone does not know the,it cannot generate a validMAC.Therefore,our proposed protocol is resistant to replay attacks.

      Resistance against eavesdropping attack:A malicious drone might attempt to capture aBor messages of other drones.Each drone refreshes thewhenever the drone swarm enters another region,and theTαis updated every time slot.Therefore,the malicious drone cannot use the captured value in other time slots and other regions.In addition,since the adversary does not know thegkS,it cannot decrypt the captured messages and obtain theTα.Therefore,our proposed protocol is resistant to the eavesdropping attack.

      5.2 Formal Security Verification Using ProVerif

      We demonstrated the proposed protocol’s mutual authentication between the drone and theRdrone.To achieve this formal security verification,we used ProVerif [31],which is a tool used in a variety of fields to automatically verify protocol security based on the Dolev-Yao attack model[38].An attacker can view and block all messages in a public channel using the Dolev-Yao attack model,as well as manipulate the contents of messages that are not cryptographically protected.In this section,we demonstrate that the proposed protocol satisfies the following security requirements in the presence of an attacker through ProVerif as below.In our proposed protocol,a drone swarm and aRdronecommunicate through a wireless channel.We assume a situation in which malicious users can exist in the public channel environment.

      (1) The secrecy of the group session key

      (2) The authenticity of the message sent by the drone swarm

      (3) The authenticity of the message st by theRdrone

      As shown in Fig.3,we generated four events and three queries to verify the above security requirements through the ProVerif tool.

      Figure 3:Declaration of events and queries

      ProVerif checks (1) by the first query whether the attacker will be aware of the secret valuegk.It can also confirm(2)and(3)by querying the correspondence assertion of the ordered relationship between the two events.In this case,‘event e==>event e′’means that event e has already been executed if event e’is executed.Thus,the second and third queries ask if event termDrone(x)and recieveT(x)have been executed when event acceptDrone(x)and sendT(y)have already been implemented.In other words,the second assertion means that a drone,which sent an msg1 that has been successfully verified,receives the msg2.Similarly,the third assertion means that only drones,which receive a valid msg2 from aRdrone,can generate the msg3.The event acceptDrone(x)and the event sendT(x)are generated byRdrone,and the event termDrone(x) and the event receive(x) is generated by the drone in a specific situation.We verified that message authentication between the drone swarm and theRdroneis well conducted.The description of each event we discussed is shown in Table 2.

      When the dinner hour approached all three went home and asked their wives if the goat had returned with the necessary provisions, and had told them what they wished prepared for their meal

      Table 2:Description of the defined event

      Fig.4 shows the verification results for the above queries.The experiments are carried out in Mac OS and Intel Core i7 with 1.2 GHz and 16 GB RAM.We published detailed protocol code and result on the GitHub repository1https://github.com/jelliyjane/DroneSwarmIDentification_ProVerif.The first result means thegkis secured from the attacker during the protocol operation.As the second query result is true,the termDrone(x)event is executed when a message is received from a legitimate drone.And then,if the third query result is true,that indicates a legitimateRdronedelivered a valid message,m and a drone received it.

      6 Performance Evaluation

      In this section,we implemented the proposed protocol and evaluated the performance of the drone swarm identification scheme.We also analyzed the computation overhead of the proposed drone swarm identification scheme by comparing existing schemes that have similar authentication steps.

      6.1 Experiments

      We built a non-flying drone swarm prototype on a MacBook and multiple Raspberry Pis to evaluate the computational performance of the proposed protocol.We used Raspberry Pi 3 Model Bs to simulate a drone swarm and theRdrone.We also utilized a MacBook Air 2020 Quad Core 1.2 GHz intel Core i7 Processor with 16 GB RAM running Mac OS Monterey 12.6.3 to simulate the ground control server(GCS).By considering an actual drone swarm communication environment,we built a wireless communication channel between the drone swarm and the GCS.We implemented our proposed protocol using Python version 3.9.1.Drone-to-RdroneandRdrone-to-GCS communication were established through a socket connection.Assuming that each entity connects to the same Wi-Fi network during communication,we set a Raspberry Pi as a Wi-Fi access point(AP).To remotely run each Raspberry Pi,A Virtual Network Computing(VNC)Viewer is used.We measured the time for drone swarm identification and batch verification,which are the main steps of the proposed protocol,according to the size of the drone swarm.

      Fig.5 shows an experimental environment with a drone swarm consisting of 5 drones and oneRdrone.TheRdroneacts as a socket communication server,and the drone swarm communicates as a client.Table 3 shows the data size and the average processing time of(1)the remote ID identification phase and (2) the batch verification phase between each drone swarm member and theRdrone.We implemented each phase of the proposed protocol ten times according to the size of a drone swarm.In(1),each drone swarm member and theRdroneexchange msg1,msg2,and msg3.The size of these messages is 100 bytes,144 bytes,and 64 bytes,respectively.In(2),theRdronesends msg4s of the drone swarm members to the GCS.The data size of msg4 is 132 bytes,and the message size sent by theRdroneto the GCS increases by multiplying msg4 by the drone swarm’s size,as the drone swarm size is bigger.Regarding processing time,it takes about 40.37 ms and about 51.28 ms,respectively,in(1),when the drone swarm size is 1 and 5.The processing time in(2)is about 2.47 ms when the drone swarm size is one and about 6.08 ms when the drone swarm size is 5.The total protocol time increases linearly as the size of the drone swarm grows.The simation results can be influenced by transmission latency and device performance which can be associated with message size and communication distance.Since the performance of(2)is only slightly affected by the size of the drone swarm,the proposed protocol has good scalability.

      Table 3:The data size and the processing time of the proposed protocol

      6.2 Performance Comparison

      We analyzed the computation overhead for our protocol and the existing schemes[6–8].We chose related schemes that provide authentication between IoT devices and a server,which is similar to our proposed protocol.For the computational comparison,we measured the average computational time of the cryptographic primitives on a drone and a GCS that we explained in 6.1.We utilized the PyCryptodome[39],which is a Python library that has been widely accepted as a way to measure each operation.Table 4 shows the execution time for computing cryptographic primitives,including hash function,ECC point multiplication,ECC point addition,and so on.Table 5 shows the result of the computational overhead comparison in terms of an IoT device,a reader node,and a server.

      Table 4:Average execution time for computing each operation

      For an accurate comparison,we only compared the authentication phase except for other processes such as key agreement and registration phase.The computational overhead on the device side in the proposed protocol is 2H+3M+1A+1AES(d)≈39.3253 ms,while existing schemes[6–8]require 6M+1A ≈75.7638 ms,7H+3M+1A ≈39.3192 ms,7H+4M ≈48.7159 ms.Reference[7]has similar computational overhead with ours.In[6,8],the authentication process includes a pseudo identifier generation,so that they have higher computational overhead than ours in terms of IoT devices.The computational overhead on the server side with a single device in a proposed protocol is 1H+2M+1A+1I ≈2.0249 ms,while[6–8]require 5M+1A ≈4.5445 ms,5H+3M ≈2.5757 ms,and 9H+4M ≈3.4377 ms,respectively.In this case,related schemes have a similar or slightly higher overhead of 0.5~2.3 ms than ours.When a server authenticates N devices,the computational cost of the server in existing schemes increases by N times that of a single device authentication.However,in the proposed protocol,the computational cost increases N times only in the ECC addition,while those of other operations are constant.

      Figure 6:Computational overhead according to the size of a drone swarm

      7 Simulation

      We simulated the proposed protocol assuming multiple drone swarms and multipleRdronesscenarios,which is difficult to simulate in a real environment.Using the Omnet++simulator[32],we first evaluated the performance of the proposed protocol by measuring the drone swarm verification time in relation to the drone swarm size,the number of drone swarms,and the number ofRdrones.In addition,we estimated the average drone swarm verification delay based on drone swarm scheduling by utilizing Matlab simulator[40].

      7.1 Setting

      We assumed that there is no mobility when the drone swarm communicates with theRdroneto request identification verification.ARdronecommunicates with each drone,sends,and receives messages necessary for identification.Then theRdronecollects identification information of drones belonging to the drone swarm and delivers it to the GCS.When there are multiple drone swarms,it is assumed thatRdronespreferentially verifies the identity of the drone swarm that came first.The transmission delay betweenRdronesand each drone was randomly set within the 10% error range above and below based on the end-to-end delay(ms)value measured by the premium traffic class[41].We applied batch verification time,which was measured in Section 6.2 for the simulations.Fig.7a is the simulation model when there are oneRdroneand one drone swarm,and Fig.7b is the simulation model when twoRdronesand two drone swarms exist.

      Figure 7:Simulation models for drone swarms

      7.2 Performance Analysis for Drone Swarm Identification

      To check the verification time based on the size of the drone swarm,we compared the total verification time based on the size of the drone swarm and the number ofRdrones.In this case,we assume that there is a single drone swarm.Fig.8 shows the time taken for the entire identification process according to the size of the drone swarm for 1,2,and 3Rdrones.

      Figure 8:Comparison of identification time according to the size of a drone swarm

      Using moreRdronesto verify drone swarm identification allows the proposed scheme to concurrently process more drone swarm identification.As illustrated in Fig.8,when the size of the drone swarm is 60,and the number ofRdronesis 3,the identification time is comparable to when the size of the drone swarm is 20 and the number ofRdronesis one.We can confirm that the reduction in identifying time is nearly proportional to the number ofRdrones.In the proposed scheme,when the size of the drone swarm is large,the identification time can be lowered efficiently based on the number ofRdrones.

      We compared the time required for theRdrone.and the GCS to identify the entirety of all drone swarms if multiple drone swarms arrived in one region at the same time.We assumed that aRdronewould perform one drone swarm identification each when there are multiple drone swarms waiting for identification.ARdrone,who finishes drone swarm identification,can help otherRdrones‘identification processes.Fig.9 compares the identification time when the number of drone swarms increases.It shows the identification time linearly goes up according to the number of drone swarms when there is oneRdronein the drone swarm scenario.Moreover,the time difference between when there are 2 or 3Rdronesand when there is only oneRdroneincreases as the number of drone swarms increases.For efficient verification,the more drone swarms arrive in the same area at the same time,the moreRdronesneed to be placed there.

      Figure 9:Comparison of identification time according to the number of drone swarms

      7.3 Performance Analysis for Drone Swarm Scheduling

      To analyze drone swarm scheduling,we simulated the cluster average waiting time according to the cluster arrival plan using the Matlab.

      Fig.10 shows the average waiting time of a drone swarm according to the arrival time interval of a drone swarm in the same region when the number ofRdronesis 1,2,and 3.In our proposed model,a GCS and aRdroneknow the region arrival time and route of the drone swarm in advance.Basically,oneRdroneperforms the identification of one drone swarm.If the number ofRdronesis greater than the number of drone swarms,aRdrone,which has no drone swarm to identify,supports otherRdrone’s identification processes.If the number of drone swarms is greater than the number ofRdrones,eachRdroneperforms authentication in the order in which the drone swarms arrive.The larger the arrival time interval between drone swarms,the less time each drone waits for identification.In particular,when the arrival time interval is 12 and 9 ms,respectively,if there are twoRdronesand threeRdrones,the average waiting time is 0.This is because the arrival time interval is greater than required for one drone swarm to verify.In the proposed scheme,when the number ofRdronesis large,if the arrival time interval between drones is more than 12 ms,drone swarms can perform the identification process without any waiting time.

      Figure 10:Average latency of drone swarms according to the arrival time interval of drone swarms

      8 Conclusion and Future Works

      In this paper,we proposed an efficient remote identification for drone swarms.To efficiently perform drone swarm identification between the GCS and the drone swarm,theRdronescollect the identification value instead of the GCS in our proposed model.By applying batch verification,the GCS could efficiently verify the aggregated identification information of drone swarm members.The proposed scheme is resistant to an impersonation attack,a replay attack,and an eavesdropping attack.We conducted formal verification by using a model verification tool,ProVerif.The formal verification results show that the proposed protocol ensures the security of a drone swarm’s group key and the correctness of the identification process.In addition,we simulated drone swarm identification scenarios and evaluated the effectiveness of the proposed scheme.We evaluated the performance of the proposed protocol when applying it to an actual drone by using Raspberry Pis and showing the computational overhead of the proposed protocol is 87% lower than existing schemes.We designed the drone swarm identification protocol considering the case where a drone in the drone swarm could leave the swarm.However,we didn’t consider the identification scenario in which an additional drone newly joins the drone swarm.Therefore,in the future,we plan to study drone swarm identification,which allows drones to join and leave dynamically in a drone swarm.

      Acknowledgement:The abstract version of this work was presented in WISA2022 poster session.

      Funding Statement:This work was partly supported by Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00225201,Development of Control Rights Protection Technology to Prevent Reverse Use of Military Unmanned Vehicles,50)and by MSIT under the ITRC(Information Technology Research Center) Supported Program (IITP-2023-2018-0-01417,Industrial 5G Bigdata Based Deep Learning Models Development and Human Resource Cultivation,50)supervised by the IITP.

      Authorship Contributions:Kang-Moon Seo and Jane Kim contributed equally to this work as co-first authors.The authors confirm contribution to the paper as follows:study conception and design:Kang-Moon Seo,Jane Kim,Seung-Hyun Seo;data collection:Kang-Moon Seo,Soojin Lee,Jun-Woo Kwon;analysis and interpretation of results: Jane Kim,Soojin Lee;draft manuscript preparation: Kang-Moon Seo,Jane Kim,Seung-Hyun Seo.All authors reviewed the results and approved the final version of the manuscript.

      Availability of Data and Materials:Data sharing is not applicable to this article as no new data were created or analyzed in this study.

      Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

      中阳县| 于田县| 新密市| 保定市| 石嘴山市| 桃江县| 汉川市| 高阳县| 北票市| 安泽县| 牙克石市| 新昌县| 青川县| 墨竹工卡县| 屏边| 磐石市| 乌海市| 包头市| 合江县| 大冶市| 临洮县| 无为县| 岑巩县| 无极县| 沾化县| 甘南县| 阿城市| 屏边| 尉氏县| 建阳市| 朔州市| 通江县| 冷水江市| 石景山区| 铅山县| 郯城县| 靖边县| 亳州市| 惠东县| 鞍山市| 玉环县|