Affiliation:
1. School of Information Security, Naval University of Engineering, Wuhan 430030, China
Abstract
Unmanned aerial vehicle mobile ad hoc networks (UAVMANETs) formed by multi-UAV self-assembling networks have rapidly developed and been widely used in many industries in recent years. However, UAVMANETs suffer from the problems of complicated key negotiations and the difficult authentication of members’ identities during key negotiations. To address these problems, this paper simplifies the authentication process by introducing a Latin square to improve the process of signature aggregation in the Boneh–Lynn–Shacham (BLS) signature scheme and to aggregate the keys negotiated via the elliptic-curve Diffie–Hellman (ECDH) protocol into new keys. As shown through security analysis and simulations, this scheme improves the efficiency of UAVMANET authentication and key negotiation while satisfying security requirements.
Funder
National Defense Science and Technology Foundation Enhancement
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference34 articles.
1. Bouachir, O., Abrassart, A., Garcia, F., and Larrieu, N. (2014, January 27–30). A mobility model for uav ad hoc network. Proceedings of the 2014 International Conference on Unmanned Aircraft Systems (ICUAS), Orlando, FL, USA.
2. Networking models in flying ad-hoc networks (fanets): Concepts and challenges;Sahingoz;J. Intell. Robot. Syst.,2014
3. Iqbal, S. (2021, January 27–30). A study on uav operating system security and future research challenges. Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Electr Network, Las Vegas, NV, USA.
4. Security in internet of drones: A comprehensive review;Samanth;Cogent Eng.,2022
5. Secure communication scheme of unmanned aerial vehicle system based on mavlink protocol;Zhang;J. Comput. Appl.,2020