2019
DOI: 10.3390/s19092066
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Delegation for Operating a Multi-Drone System

Abstract: As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators. If a drone is illegally captured, some important data will be exposed to the attacker. In this paper, we propose a saveless-based key management and delegation system for a multi-drone control system. The proposed system enables a multi-drone control system to highly resist phy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…CrazyFlies [169]) are effectively undetectable at sufficient range to allow eavesdropping or spying on confidential facilities, and if the drone is equipped with encryption modules, RF scanners may not detect its approach. A fleet of drones can construct a high security network using advanced micro-computers and lightweighted security schemes [170], [171] that would be impossible to crack until the drones completed their invasion. Indeed, RF scanners may become obsolete unless cracking technology catches up with encryption schemes or adopt working quantum computing devices.…”
Section: ) Drone Detection Avoidancementioning
confidence: 99%
“…CrazyFlies [169]) are effectively undetectable at sufficient range to allow eavesdropping or spying on confidential facilities, and if the drone is equipped with encryption modules, RF scanners may not detect its approach. A fleet of drones can construct a high security network using advanced micro-computers and lightweighted security schemes [170], [171] that would be impossible to crack until the drones completed their invasion. Indeed, RF scanners may become obsolete unless cracking technology catches up with encryption schemes or adopt working quantum computing devices.…”
Section: ) Drone Detection Avoidancementioning
confidence: 99%
“…To resist against the physical capturing of drones with minimum exposure of confidential data, Bae and Kim [32] proposed a saveless-based key management and delegation system for a multi-drone system. Nevertheless, the proposed scheme is not compatible with devices having limited on-board energy, or, in this case, UAVs, because the process of key renewal suffers significantly due to scarce available energy.…”
Section: Related Workmentioning
confidence: 99%
“…The significance of saveless property is that the drone spares least secret information in its storage. Here all group session keys are not equivalent, just drones which are same-hop from the GCS have a similar session key, which is unique in relation to other gathering key administration frameworks [4]. These session keys are produced by the hash chain work, so one of the drones can realize the other's session key, and they can speak with one another.…”
Section: Related Workmentioning
confidence: 99%