DOI QR코드

DOI QR Code

PUF-based Secure FANET Routing Protocol for Multi-Drone

  • Park, Yoon-Gil (Dept. of Computer Science and Engineering, Korea National Defense University) ;
  • Lee, Soo-Jin (Dept. of Computer Science and Engineering, Korea National Defense University)
  • Received : 2020.07.24
  • Accepted : 2020.09.15
  • Published : 2020.09.29

Abstract

In order to operate multi drone efficiently, existing control methods must be improved, and drones must be able to construct communication networks autonomously. FANET(Flying Ad-Hoc Network), which is being considered as an alternative to solving these problems, is based on ad hoc network technology and can be exposed to a variety of security vulnerabilities. However, due to the limited computational power and memory of FANET nodes, and rapid and frequent changes in network topology, it is not easy to apply the existing security measures to FANET without modification. Thus, this paper proposes lightweight security measures applicable to FANET, which have distinct characteristics from existing ad hoc networks by utilizing PUF technology. The proposed security measures utilize unique values generated by non-replicable PUFs to increase the safety of AODV, FANET's reactive routing protocol, and are resistant to various attacks.

군집 드론을 효율적으로 운영하기 위해서는 기존 통제방식이 개선되어야 하며, 드론들이 자율적으로 통신망을 구성할 수 있어야 한다. 이러한 문제를 해결하기 위한 대안으로 검토되고 있는 FANET(Flying Ad-Hoc Network)은 애드혹 네트워크 기술을 기반으로 하고 있어 다양한 보안취약점에 노출될 수 있다. 그러나 FANET 노드들의 제한적인 연산능력과 메모리, 급격하고 잦은 네트워크 토폴로지 변화 등으로 인해 애드혹 네트워크에 제안되었던 보안대책을 수정 없이 FANET에 그대로 적용하는것은 쉽지 않다. 이에 본 논문에서는 PUF 기술을 활용하여 기존 애드혹 네트워크와는 차별화된 특성을 가지는 FANET에 적용 가능한 경량화된 보안대책을 제안한다. 제시된 보안대책은 복제 불가능한 PUF에서 생성되는 고유한 값을 활용하여 FANET의 Reactive 라우팅 프로토콜인 AODV의 안전성을 높이며, 다양한 공격에 대한 내성을 가진다.

Keywords

References

  1. Bekmezci, Ilker, O. K. Sahingoz, and S. Temel, "Flying Ad-Hoc Networks (FANETs): A survey," Ad Hoc Networks, Vol. 11, No. 3, pp. 1254-1270, May 2013. DOI: 10.1016/j.adhoc.2012.12.004
  2. Ha, Il-Kyu, "Analysis of Efficient Health Data Transmission Methods based on the Fusion of WBAN and FANET," Journal of the Korea Institute of Information and Communication Engineering, Vol. 21, No. 2, pp. 386-394, Feb 2017. DOI: 10.6109/jkiice.2017.21.2.386
  3. C. E. Perkins, E. M. Royer, "Ad-hoc on-demand distance vector routing," Proc. of the WMCSA'99 Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, New Orleans, LA, USA, 1999. DOI: 10.1109/MCSA.1999.749281
  4. C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance comparison of two on-demand routing protocols for ad hoc networks", IEEE Personal communications, Vol. 8, No. 1, pp. 16-28, Feb 2001. DOI: 10.1109/98.904895
  5. V. Mulert, J. I. Welch, and W. K. Seah, "Security threats and solutions in MANETs: A case study using AODV and SAODV," Journal of network and computer applications, Vol. 35, No. 4, pp. 1249-1259, July 2012. DOI: 10.1016/j.jnca.2012.01.019
  6. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. B. Royer, "A secure routing protocol for ad hoc networks," Proc. of the 10th IEEE International Conference on Network Protocols, pp. 78-87, Paris, France, Nov 2002. DOI: 10.1109/ICNP.2002.1181388
  7. M. G. Zapata, N. Asokan, "Securing ad hoc routing protocols," Proc. of the 1st ACM workshop on Wireless security, pp. 1-10, Atlanta GA USA, Sept 2002. DOI: 10.1145/570681.570682
  8. Q. Li, M. Zhao, J. Walker, Y. C. Hu, A. Perrig and W. Trappe. "SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks", Security and Communication Networks, Vol. 2, No. 4, pp. 325-340, Sept 2008. DOI: 10.1002/sec.60
  9. M. Mohammadizadeh, A. Movaghar, S. M. Safi "SEAODV: Secure efficient AODV routing protocol for MANETs networks", Proc of the 2nd International Conference on Interaction Sciences : Information Technology, Culture and Human, pp. 940-944, Seoul Korea, Nov 2009. DOI: 10.1145/1655925.1656096
  10. A. Perrig, R. Canetti, J. D. Tygar, D. Song,"The TESLA broadcast authentication protocol", Rsa Laboratories Cryptobytes, Vol. 5, No. 2, pp. 2-13, Fall 2002. DOI: 10.1007/978-1-4615-0229-6_3
  11. Baek. Jong-Hak, Sin. Gwang-Jo, "Development and Application of Security Chip Technology Using PUF Technology", The Magazine of the IEIE, Vol. 43, No. 7, pp. 59-67, July 2016.
  12. Sumin Kim, "A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environmen," Jouranl of Information and Security, Vol. 19, No. 5, pp. 107-118, Dec 2019.
  13. T. W. Kim, B. D. Choi and D. K. Kim, "Zero bit error rate ID generation circuit using via formation probability in $0.18{\mu}m$ CMOS process", Electronics letters, Vol. 50, No. 12, pp. 876-877, June 2014. DOI: 10.1049/el.2013.3474
  14. Ahn Hyo min, "Destination-initiated Fast Route Acquisition Scheme for AODV", Dept. of Electrical and Electronic Engineering, The Graduate School Yonsei University, 2003