DOI QR코드

DOI QR Code

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks

군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구

  • Shin, Minjeong (Dept. of Information & Communication Eng., Graduate School, Pukyong National University) ;
  • Kim, Sungun (Dept. of Information & Communication Eng., Pukyong National University)
  • Received : 2018.07.03
  • Accepted : 2018.07.12
  • Published : 2018.08.31

Abstract

In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

Keywords

References

  1. A. Restas, "Drone Application for Supporting Disaster Management," World Journal of Engineering and Technology, Vol. 3, No. 3, pp. 316-321, 2015. https://doi.org/10.4236/wjet.2015.33C047
  2. I. Bekmezci, O.K. Sahingoz, and S. Temel, "Flying Ad-Hoc Networks (FANETs): A survey," Ad Hoc Networks, Vol. 11, No. 3, pp. 1254-1270, 2013. https://doi.org/10.1016/j.adhoc.2012.12.004
  3. A.J. Marty, Vulnerability Analysis of the MAV Link Protocol for Command and Control of Unmanned Aircraft, Master's Thesis of Air Force Institute of Technology, 2013.
  4. N. Prapulla, S. Veena, and G. Srinivasalu, "Development of Algorithms for MAV Security," Proceeding of IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 799-802, 2016.
  5. IETF, Diffie-Hellman Key Agreement Method, RFC 2631, 1999.
  6. M. Ergen and D. Lee, "WTRP-Wireless Token Ring Protocol," IEEE Transactions on Vehicular Technology, Vol. 54, No. 6, pp. 1863-1881, 2004.
  7. Y. Shiu, S. Y. Chang, H. Wu, S. C. H. Huang, and H. Chen, "Physical Layer Security in Wireless Networks: A Tutorial IEEE Wireless Communications," IEEE Wireless Communication, Vol. 18, No. 2, pp. 66-74, 2011. https://doi.org/10.1109/MWC.2011.5751298
  8. M. Shin and S. Kim, "A Study on the Security Framework for IoT Services Based on Cloud and Fog Computing," Journal of Korea Multimedia Society, Vol. 20, No. 12, 2017, pp. 101-112. https://doi.org/10.9717/kmms.2017.20.2.101
  9. D. Lee, D. C. Kim, D. Kwon, and H. Kim, "Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA," Sensors, Vol. 14, No. 1, pp. 975-994, 2014. https://doi.org/10.3390/s140100975
  10. J.S. Coron, Y. Dodis, C. Malinaud, and P. Puniya, "Merkle-Damgard Revisited: How to Construct a Hash Function," Proceeding of Annual International Conference on Advances in Cryptology, pp. 430-448, 2005.