BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks
- URL: http://arxiv.org/abs/2407.00630v1
- Date: Sun, 30 Jun 2024 09:06:49 GMT
- Title: BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks
- Authors: Mingyue Xie, Zheng Chang, Osama Alfarraj, Keping Yu, Tao Chen, Hongwei Li,
- Abstract summary: Unmanned aerial vehicles (UAVs) are vulnerable to interception and attacks when operated remotely without a unified identity authentication.
We introduce a blockchain-assisted zero-trust authentication scheme, namely BAZAM, designed for multi-UAV wireless networks.
- Score: 21.51085709522321
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Unmanned aerial vehicles (UAVs) are vulnerable to interception and attacks when operated remotely without a unified and efficient identity authentication. Meanwhile, the openness of wireless communication environments potentially leads to data leakage and system paralysis. However, conventional authentication schemes in the UAV network are system-centric, failing to adapt to the diversity of UAVs identities and access, resulting in changes in network environments and connection statuses. Additionally, UAVs are not subjected to periodic identity compliance checks once authenticated, leading to difficulties in controlling access anomalies. Therefore, in this work, we consider a zero-trust framework for UAV network authentication, aiming to achieve UAVs identity authentication through the principle of ``never trust and always verify''. We introduce a blockchain-assisted zero-trust authentication scheme, namely BAZAM, designed for multi-UAV wireless networks. In this scheme, UAVs follow a key generation approach using physical unclonable functions (PUFs), and cryptographic technique helps verify registration and access requests of UAVs. The blockchain is applied to store UAVs authentication information in immutable storage. Through thorough security analysis and extensive evaluation, we demonstrate the effectiveness and efficiency of the proposed BAZAM.
Related papers
- Securing UAV Communication: Authentication and Integrity [0.0]
We propose an authentication method to secure UAV data exchange over an insecure communication channel.
Our solution combines Diffie-Hellman key exchange and Hash-based Message Authentication Code (HMAC) within ROS communication channels.
Both drones successfully detected tampered keys, affirming our method's efficacy in protecting UAV communication.
arXiv Detail & Related papers (2024-10-06T22:36:06Z) - BETA-UAV: Blockchain-based Efficient Authentication for Secure UAV Communication [6.885742280873289]
This paper presents an Efficient, and Trusted Authentication scheme for UAV communication, BETA-UAV.
The smart contract in BETA-UAV allows participants to publish and call transactions from the blockchain network.
transaction addresses are proof of freshness and trustworthiness for subsequent transmissions.
arXiv Detail & Related papers (2024-02-24T13:54:54Z) - Blockchain-Empowered Immutable and Reliable Delivery Service (BIRDS) Using UAV Networks [6.66583575156837]
Exploiting unmanned aerial vehicles (UAVs) for delivery services is expected to reduce delivery time and human resource costs.
The proximity of these UAVs to the ground can make them an ideal target for opportunistic criminals.
We propose the blockchain-Empowered, Immutable, and Reliable Delivery Service (BIRDS) framework to address data security challenges.
arXiv Detail & Related papers (2024-02-07T12:39:59Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Tamper-Evident Pairing [55.2480439325792]
Tamper-Evident Pairing (TEP) is an improvement of the Push-Button configuration (PBC) standard.
TEP relies on the Tamper-Evident Announcement (TEA), which guarantees that an adversary can neither tamper a transmitted message without being detected, nor hide the fact that the message has been sent.
This paper provides a comprehensive overview of the TEP protocol, including all information needed to understand how it works.
arXiv Detail & Related papers (2023-11-24T18:54:00Z) - Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking [21.471242542278233]
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue.
Some blockchain-based UAV identity authentication solutions are proposed to establish decentralized and trusted authentication systems without relying on infrastructure.
We propose a blockchain maintained by head UAVs of all clusters, managing identity information to guarantee the security of decentralized identity management.
arXiv Detail & Related papers (2023-11-15T02:17:59Z) - UAV Swarm-enabled Collaborative Secure Relay Communications with
Time-domain Colluding Eavesdropper [115.56455278813756]
Unmanned aerial vehicles (UAV) as aerial relays are practically appealing for assisting Internet Things (IoT) network.
In this work, we aim to utilize the UAV to assist secure communication between the UAV base station and terminal terminal devices.
arXiv Detail & Related papers (2023-10-03T11:47:01Z) - Evidential Detection and Tracking Collaboration: New Problem, Benchmark
and Algorithm for Robust Anti-UAV System [56.51247807483176]
Unmanned Aerial Vehicles (UAVs) have been widely used in many areas, including transportation, surveillance, and military.
Previous works have simplified such an anti-UAV task as a tracking problem, where prior information of UAVs is always provided.
In this paper, we first formulate a new and practical anti-UAV problem featuring the UAVs perception in complex scenes without prior UAVs information.
arXiv Detail & Related papers (2023-06-27T19:30:23Z) - Spotting adversarial samples for speaker verification by neural vocoders [102.1486475058963]
We adopt neural vocoders to spot adversarial samples for automatic speaker verification (ASV)
We find that the difference between the ASV scores for the original and re-synthesize audio is a good indicator for discrimination between genuine and adversarial samples.
Our codes will be made open-source for future works to do comparison.
arXiv Detail & Related papers (2021-07-01T08:58:16Z) - Anti-UAV: A Large Multi-Modal Benchmark for UAV Tracking [59.06167734555191]
Unmanned Aerial Vehicle (UAV) offers lots of applications in both commerce and recreation.
We consider the task of tracking UAVs, providing rich information such as location and trajectory.
We propose a dataset, Anti-UAV, with more than 300 video pairs containing over 580k manually annotated bounding boxes.
arXiv Detail & Related papers (2021-01-21T07:00:15Z) - Secure communication between UAVs using a method based on smart agents
in unmanned aerial vehicles [1.2691047660244335]
Unmanned aerial vehicles (UAVs) can be deployed to monitor very large areas without the need for network infrastructure.
Such communication poses security challenges due to its dynamic topology.
The proposed method uses two phases to counter malicious UAV attacks.
arXiv Detail & Related papers (2020-11-03T10:33:39Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.