A Traceable and Privacy-Preserving Authentication for UAV Communication Control System

In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2020-01, Vol.9 (1), p.62
Hauptverfasser: Chen, Chin-Ling, Deng, Yong-Yuan, Weng, Wei, Chen, Chi-Hua, Chiu, Yi-Jui, Wu, Chih-Ming
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page 62
container_title Electronics (Basel)
container_volume 9
creator Chen, Chin-Ling
Deng, Yong-Yuan
Weng, Wei
Chen, Chi-Hua
Chiu, Yi-Jui
Wu, Chih-Ming
description In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.
doi_str_mv 10.3390/electronics9010062
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2548451177</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2548451177</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</originalsourceid><addsrcrecordid>eNplUF1Lw0AQPETBUvsHfDrwOXofSS73GIIfhYIF276GzWWjKcldvUsK_fdGqiC4sOwwDLPDEHLL2b2Umj1gh2bwzrYmaMYZS8UFmQmmdKSFFpd_8DVZhLBn02guM8lmZJfTjQeDUHVIwdZ07dsjmFO09hjQH1v7TvNx-EA7tAaG1lnaOE-3-Y4Wru9H-8sWzk4ZOvp2CgP2N-SqgS7g4ufOyfbpcVO8RKvX52WRryIjuR4iUQsRQ6LTBupGV5XiqpIKIM0Sk5pMgcRMTxtLVLHgJgORgGICU6hNbLick7uz78G7zxHDUO7d6O30shRJnMUJ50pNKnFWGe9C8NiUB9_24E8lZ-V3heX_CuUXPTNnyw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2548451177</pqid></control><display><type>article</type><title>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Chen, Chin-Ling ; Deng, Yong-Yuan ; Weng, Wei ; Chen, Chi-Hua ; Chiu, Yi-Jui ; Wu, Chih-Ming</creator><creatorcontrib>Chen, Chin-Ling ; Deng, Yong-Yuan ; Weng, Wei ; Chen, Chi-Hua ; Chiu, Yi-Jui ; Wu, Chih-Ming</creatorcontrib><description>In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics9010062</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Authentication ; Communications systems ; Cost analysis ; Cryptography ; Curves ; Denial of service attacks ; Digital signatures ; Drones ; Ground stations ; Infrastructure ; Internet ; Internet of Things ; Law enforcement ; Privacy ; Security systems ; Spoofing ; Surveillance ; Toys ; Unmanned aerial vehicles ; Wireless networks</subject><ispartof>Electronics (Basel), 2020-01, Vol.9 (1), p.62</ispartof><rights>2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</citedby><cites>FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</cites><orcidid>0000-0001-7668-7425 ; 0000-0001-5632-9321 ; 0000-0002-4958-2043 ; 0000-0002-9581-8184</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Chen, Chin-Ling</creatorcontrib><creatorcontrib>Deng, Yong-Yuan</creatorcontrib><creatorcontrib>Weng, Wei</creatorcontrib><creatorcontrib>Chen, Chi-Hua</creatorcontrib><creatorcontrib>Chiu, Yi-Jui</creatorcontrib><creatorcontrib>Wu, Chih-Ming</creatorcontrib><title>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</title><title>Electronics (Basel)</title><description>In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.</description><subject>Authentication</subject><subject>Communications systems</subject><subject>Cost analysis</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Denial of service attacks</subject><subject>Digital signatures</subject><subject>Drones</subject><subject>Ground stations</subject><subject>Infrastructure</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Law enforcement</subject><subject>Privacy</subject><subject>Security systems</subject><subject>Spoofing</subject><subject>Surveillance</subject><subject>Toys</subject><subject>Unmanned aerial vehicles</subject><subject>Wireless networks</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNplUF1Lw0AQPETBUvsHfDrwOXofSS73GIIfhYIF276GzWWjKcldvUsK_fdGqiC4sOwwDLPDEHLL2b2Umj1gh2bwzrYmaMYZS8UFmQmmdKSFFpd_8DVZhLBn02guM8lmZJfTjQeDUHVIwdZ07dsjmFO09hjQH1v7TvNx-EA7tAaG1lnaOE-3-Y4Wru9H-8sWzk4ZOvp2CgP2N-SqgS7g4ufOyfbpcVO8RKvX52WRryIjuR4iUQsRQ6LTBupGV5XiqpIKIM0Sk5pMgcRMTxtLVLHgJgORgGICU6hNbLick7uz78G7zxHDUO7d6O30shRJnMUJ50pNKnFWGe9C8NiUB9_24E8lZ-V3heX_CuUXPTNnyw</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Chen, Chin-Ling</creator><creator>Deng, Yong-Yuan</creator><creator>Weng, Wei</creator><creator>Chen, Chi-Hua</creator><creator>Chiu, Yi-Jui</creator><creator>Wu, Chih-Ming</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0001-7668-7425</orcidid><orcidid>https://orcid.org/0000-0001-5632-9321</orcidid><orcidid>https://orcid.org/0000-0002-4958-2043</orcidid><orcidid>https://orcid.org/0000-0002-9581-8184</orcidid></search><sort><creationdate>20200101</creationdate><title>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</title><author>Chen, Chin-Ling ; Deng, Yong-Yuan ; Weng, Wei ; Chen, Chi-Hua ; Chiu, Yi-Jui ; Wu, Chih-Ming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Authentication</topic><topic>Communications systems</topic><topic>Cost analysis</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Denial of service attacks</topic><topic>Digital signatures</topic><topic>Drones</topic><topic>Ground stations</topic><topic>Infrastructure</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Law enforcement</topic><topic>Privacy</topic><topic>Security systems</topic><topic>Spoofing</topic><topic>Surveillance</topic><topic>Toys</topic><topic>Unmanned aerial vehicles</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Chin-Ling</creatorcontrib><creatorcontrib>Deng, Yong-Yuan</creatorcontrib><creatorcontrib>Weng, Wei</creatorcontrib><creatorcontrib>Chen, Chi-Hua</creatorcontrib><creatorcontrib>Chiu, Yi-Jui</creatorcontrib><creatorcontrib>Wu, Chih-Ming</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chen, Chin-Ling</au><au>Deng, Yong-Yuan</au><au>Weng, Wei</au><au>Chen, Chi-Hua</au><au>Chiu, Yi-Jui</au><au>Wu, Chih-Ming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</atitle><jtitle>Electronics (Basel)</jtitle><date>2020-01-01</date><risdate>2020</risdate><volume>9</volume><issue>1</issue><spage>62</spage><pages>62-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics9010062</doi><orcidid>https://orcid.org/0000-0001-7668-7425</orcidid><orcidid>https://orcid.org/0000-0001-5632-9321</orcidid><orcidid>https://orcid.org/0000-0002-4958-2043</orcidid><orcidid>https://orcid.org/0000-0002-9581-8184</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2020-01, Vol.9 (1), p.62
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2548451177
source MDPI - Multidisciplinary Digital Publishing Institute; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Authentication
Communications systems
Cost analysis
Cryptography
Curves
Denial of service attacks
Digital signatures
Drones
Ground stations
Infrastructure
Internet
Internet of Things
Law enforcement
Privacy
Security systems
Spoofing
Surveillance
Toys
Unmanned aerial vehicles
Wireless networks
title A Traceable and Privacy-Preserving Authentication for UAV Communication Control System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T18%3A55%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Traceable%20and%20Privacy-Preserving%20Authentication%20for%20UAV%20Communication%20Control%20System&rft.jtitle=Electronics%20(Basel)&rft.au=Chen,%20Chin-Ling&rft.date=2020-01-01&rft.volume=9&rft.issue=1&rft.spage=62&rft.pages=62-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics9010062&rft_dat=%3Cproquest_cross%3E2548451177%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2548451177&rft_id=info:pmid/&rfr_iscdi=true