An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems

@article{Chen2018AnED,
  title={An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems},
  author={Liquan Chen and Sijie Qian and Ming Lim and Shihui Wang},
  journal={China Communications},
  year={2018},
  volume={15},
  pages={61-76}
}
In network-connected UAV (NC-UAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation (DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable… Expand
A Traceable and Privacy-Preserving Authentication for UAV Communication Control System
TLDR
A traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. Expand
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
TLDR
A secure lightweight proven authenticated key agreement (SLPAKA) technique for IoD deployment that is free from all the problems identified in the scheme of Chen et al. and outperforms all the other benchmarking techniques in terms of security and lightweight features. Expand
SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
TLDR
A lightweight mutual authentication scheme based on Physical Unclonable Functions for UAV-GS authentication is presented and is resilient against many security attacks such as masquerade, replay, node tampering, and cloning attacks, etc. Expand
S-MAPS: Scalable Mutual Authentication Protocol for Dynamic UAV Swarms
Unmanned Aerial Vehicles (UAVs) domain has seen rapid developments in recent years. UAVs have been deployed for many applications and missions like data transmission, cellular service provisioning,Expand
Authentication Methods for UAV Communication
TLDR
This paper analyzes and compares two authentication protocols developed for WSNs and modified for UAV usage and performs tests on security-specific operation such as hash tables and elliptic curve operations. Expand
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems
TLDR
An S-IoD framework for a UAV environment that independently collects sensible information and a lightweight privacy-preserving scheme (L-PPS) is introduced in order to reduce the computation cost of the authentication protocol. Expand
Research of Security Routing Protocol for UAV Communication Network Based on AODV
TLDR
An efficient Digital Signature algorithm based on the elliptic curve cryptosystem is applied to routing protocol, and an improved security method suitable for on-demand routing protocol is proposed, and results show that the improved routing protocol can effectively improve the security of the UAV communication network. Expand
Research on direct anonymous attestation mechanism in enterprise information management
TLDR
A novel direct anonymous attestation scheme based on a novel short signature scheme, which is applied into the member joining and signature phases, which simplifies the signing and verification process of member certificates and reduces its computing costs. Expand
Blockchain enabled verification for cellular-connected unmanned aircraft system networking
TLDR
This paper proposes a novel blockchain-based approach to mitigate the threats from accessing the malicious BSs, and implements the consensus construction on the authentication of networking access to enhance the efficiency of verification between BSs. Expand
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
TLDR
A comprehensive detail is presented on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Expand
...
1
2
...

References

SHOWING 1-10 OF 25 REFERENCES
Multi-domain Direct Anonymous Attestation Scheme from Pairings
TLDR
This paper proposes a multi-domain DAA scheme, which is based on proxy signature and a pairings based DAA method, and the results show that the proposed scheme is secure and effective. Expand
Direct Anonymous Attestation for Next Generation TPM
TLDR
An efficient construction that implements all anonymous authentication features specified in DAA is presented and is provably secure in the random oracle model under the q- SDH and the decisional Diffie-Hellman assumption. Expand
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
TLDR
This paper proposes a new DAA scheme from elliptic curve cryptography and bilinear maps that is efficient and provably secure in the random oracle model under the LRSW (stands for Lysyanskaya, Rivest, Sahai and Wolf) assumption and the decisional Bilinear Diffie–Hellman assumption. Expand
Direct anonymous attestation
TLDR
DAA allows for pseudonyms, i.e., for each signature a user can decide whether or not the signature should be linkable to another signature, and is provably secure in the random oracle model under the strong RSA and the decisional Diffie-Hellman assumption. Expand
On the Design and Implementation of an Efficient DAA Scheme
TLDR
This contribution is a modification to an existing pairing-based DAA scheme that significantly improves efficiency, and a comparison with the original RSA-basedDAA scheme via a concrete implementation. Expand
A new process and framework for direct anonymous attestation based on symmetric bilinear maps
  • Liang Tan, M. Zhou
  • Computer Science
  • Wuhan University Journal of Natural Sciences
  • 2011
TLDR
A new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solution to ECC-based TPM in protecting the privacy of the TPM and shows better simplicity and high efficiency. Expand
A DAA Scheme Using Batch Proof and Verification
TLDR
This contribution in this paper is a new DAA scheme that makes use of an efficient batch proof and verification scheme to reduce the TPM computational workload. Expand
Improving communication security of open source UAVs: Encrypting radio control link
Safety and reliability (also referred to as airworthiness) are well-known factors of Unmanned Aerial Vehicle (UAV) operations, and significant effort has been put into maintaining and improving themExpand
Signature Schemes and Anonymous Credentials from Bilinear Maps
TLDR
This work proposes a new and efficient signature scheme that is provably secure in the plain model and provides efficient protocols that allow one to prove in zero-knowledge the knowledge of a signature on a committed (or encrypted) message and to obtain a signatureon a committed message. Expand
Pairings in Trusted Computing
TLDR
It is shown that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings, which provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes. Expand
...
1
2
3
...