A Traceable and Privacy-Preserving Authentication for UAV Communication Control System
In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2020-01, Vol.9 (1), p.62 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | 62 |
container_title | Electronics (Basel) |
container_volume | 9 |
creator | Chen, Chin-Ling Deng, Yong-Yuan Weng, Wei Chen, Chi-Hua Chiu, Yi-Jui Wu, Chih-Ming |
description | In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field. |
doi_str_mv | 10.3390/electronics9010062 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2548451177</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2548451177</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</originalsourceid><addsrcrecordid>eNplUF1Lw0AQPETBUvsHfDrwOXofSS73GIIfhYIF276GzWWjKcldvUsK_fdGqiC4sOwwDLPDEHLL2b2Umj1gh2bwzrYmaMYZS8UFmQmmdKSFFpd_8DVZhLBn02guM8lmZJfTjQeDUHVIwdZ07dsjmFO09hjQH1v7TvNx-EA7tAaG1lnaOE-3-Y4Wru9H-8sWzk4ZOvp2CgP2N-SqgS7g4ufOyfbpcVO8RKvX52WRryIjuR4iUQsRQ6LTBupGV5XiqpIKIM0Sk5pMgcRMTxtLVLHgJgORgGICU6hNbLick7uz78G7zxHDUO7d6O30shRJnMUJ50pNKnFWGe9C8NiUB9_24E8lZ-V3heX_CuUXPTNnyw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2548451177</pqid></control><display><type>article</type><title>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Chen, Chin-Ling ; Deng, Yong-Yuan ; Weng, Wei ; Chen, Chi-Hua ; Chiu, Yi-Jui ; Wu, Chih-Ming</creator><creatorcontrib>Chen, Chin-Ling ; Deng, Yong-Yuan ; Weng, Wei ; Chen, Chi-Hua ; Chiu, Yi-Jui ; Wu, Chih-Ming</creatorcontrib><description>In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics9010062</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Authentication ; Communications systems ; Cost analysis ; Cryptography ; Curves ; Denial of service attacks ; Digital signatures ; Drones ; Ground stations ; Infrastructure ; Internet ; Internet of Things ; Law enforcement ; Privacy ; Security systems ; Spoofing ; Surveillance ; Toys ; Unmanned aerial vehicles ; Wireless networks</subject><ispartof>Electronics (Basel), 2020-01, Vol.9 (1), p.62</ispartof><rights>2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</citedby><cites>FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</cites><orcidid>0000-0001-7668-7425 ; 0000-0001-5632-9321 ; 0000-0002-4958-2043 ; 0000-0002-9581-8184</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Chen, Chin-Ling</creatorcontrib><creatorcontrib>Deng, Yong-Yuan</creatorcontrib><creatorcontrib>Weng, Wei</creatorcontrib><creatorcontrib>Chen, Chi-Hua</creatorcontrib><creatorcontrib>Chiu, Yi-Jui</creatorcontrib><creatorcontrib>Wu, Chih-Ming</creatorcontrib><title>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</title><title>Electronics (Basel)</title><description>In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.</description><subject>Authentication</subject><subject>Communications systems</subject><subject>Cost analysis</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Denial of service attacks</subject><subject>Digital signatures</subject><subject>Drones</subject><subject>Ground stations</subject><subject>Infrastructure</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Law enforcement</subject><subject>Privacy</subject><subject>Security systems</subject><subject>Spoofing</subject><subject>Surveillance</subject><subject>Toys</subject><subject>Unmanned aerial vehicles</subject><subject>Wireless networks</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNplUF1Lw0AQPETBUvsHfDrwOXofSS73GIIfhYIF276GzWWjKcldvUsK_fdGqiC4sOwwDLPDEHLL2b2Umj1gh2bwzrYmaMYZS8UFmQmmdKSFFpd_8DVZhLBn02guM8lmZJfTjQeDUHVIwdZ07dsjmFO09hjQH1v7TvNx-EA7tAaG1lnaOE-3-Y4Wru9H-8sWzk4ZOvp2CgP2N-SqgS7g4ufOyfbpcVO8RKvX52WRryIjuR4iUQsRQ6LTBupGV5XiqpIKIM0Sk5pMgcRMTxtLVLHgJgORgGICU6hNbLick7uz78G7zxHDUO7d6O30shRJnMUJ50pNKnFWGe9C8NiUB9_24E8lZ-V3heX_CuUXPTNnyw</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Chen, Chin-Ling</creator><creator>Deng, Yong-Yuan</creator><creator>Weng, Wei</creator><creator>Chen, Chi-Hua</creator><creator>Chiu, Yi-Jui</creator><creator>Wu, Chih-Ming</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0001-7668-7425</orcidid><orcidid>https://orcid.org/0000-0001-5632-9321</orcidid><orcidid>https://orcid.org/0000-0002-4958-2043</orcidid><orcidid>https://orcid.org/0000-0002-9581-8184</orcidid></search><sort><creationdate>20200101</creationdate><title>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</title><author>Chen, Chin-Ling ; Deng, Yong-Yuan ; Weng, Wei ; Chen, Chi-Hua ; Chiu, Yi-Jui ; Wu, Chih-Ming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-2d224a596fadf9bb717b37aa685c6c87a3e893e843e7421c8a25a702e6adc4c13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Authentication</topic><topic>Communications systems</topic><topic>Cost analysis</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Denial of service attacks</topic><topic>Digital signatures</topic><topic>Drones</topic><topic>Ground stations</topic><topic>Infrastructure</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Law enforcement</topic><topic>Privacy</topic><topic>Security systems</topic><topic>Spoofing</topic><topic>Surveillance</topic><topic>Toys</topic><topic>Unmanned aerial vehicles</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Chin-Ling</creatorcontrib><creatorcontrib>Deng, Yong-Yuan</creatorcontrib><creatorcontrib>Weng, Wei</creatorcontrib><creatorcontrib>Chen, Chi-Hua</creatorcontrib><creatorcontrib>Chiu, Yi-Jui</creatorcontrib><creatorcontrib>Wu, Chih-Ming</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chen, Chin-Ling</au><au>Deng, Yong-Yuan</au><au>Weng, Wei</au><au>Chen, Chi-Hua</au><au>Chiu, Yi-Jui</au><au>Wu, Chih-Ming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Traceable and Privacy-Preserving Authentication for UAV Communication Control System</atitle><jtitle>Electronics (Basel)</jtitle><date>2020-01-01</date><risdate>2020</risdate><volume>9</volume><issue>1</issue><spage>62</spage><pages>62-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics9010062</doi><orcidid>https://orcid.org/0000-0001-7668-7425</orcidid><orcidid>https://orcid.org/0000-0001-5632-9321</orcidid><orcidid>https://orcid.org/0000-0002-4958-2043</orcidid><orcidid>https://orcid.org/0000-0002-9581-8184</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2020-01, Vol.9 (1), p.62 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2548451177 |
source | MDPI - Multidisciplinary Digital Publishing Institute; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Authentication Communications systems Cost analysis Cryptography Curves Denial of service attacks Digital signatures Drones Ground stations Infrastructure Internet Internet of Things Law enforcement Privacy Security systems Spoofing Surveillance Toys Unmanned aerial vehicles Wireless networks |
title | A Traceable and Privacy-Preserving Authentication for UAV Communication Control System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T18%3A55%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Traceable%20and%20Privacy-Preserving%20Authentication%20for%20UAV%20Communication%20Control%20System&rft.jtitle=Electronics%20(Basel)&rft.au=Chen,%20Chin-Ling&rft.date=2020-01-01&rft.volume=9&rft.issue=1&rft.spage=62&rft.pages=62-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics9010062&rft_dat=%3Cproquest_cross%3E2548451177%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2548451177&rft_id=info:pmid/&rfr_iscdi=true |