Loading...
Post-Quantum Authentication and Communication Security for Drone Networks
Derakhshan Rudsari, Parya | 2024
0
Viewed
- Type of Document: M.Sc. Thesis
- Language: Farsi
- Document No: 57820 (19)
- University: Sharif University of Technology
- Department: Computer Engineering
- Advisor(s): Bayat Sarmadi, Siavash
- Abstract:
- Modern societies rely on a complex network of interconnected devices and individuals to fa- cilitate the exchange and monitoring of information. In this manner, drones function as flying smart nodes in the wireless network ecosystem, collecting, monitoring, and transmitting data. This dynamic and thriving technology serves diverse applications, including navigation, re- mote sensing, and disaster response. However, drone networks face critical challenges, such as data security, privacy preservation, and device interoperability. Traditionally, drone net- works’ security relies on classical cryptographic methods, such as elliptic curve cryptography and hash functions. However, recent advances in quantum computing render these conven- tional methods vulnerable, necessitating the adoption of quantum-resistant approaches. Al- beit, these methods often introduce new constraints, including larger key sizes and increased processing overheads. This research presents a comprehensive study of drone networks, focusing on essential security requirements and challenges, such as authentication, confidentiality, integrity, and resilience against physical threats. To address these issues, a robust protocol based on post-quantum cryptography is designed and proposed to ensure secure communications and authentication within drone networks. A comprehensive security analysis is performed using the established DY threat model and the BPR security models, complemented by formal verification via the AVISPA tool. The proposed protocol is also implemented in C/C++ for performance evalu- ation. Furthermore, a comparative analysis is performed against existing solutions, demon- strating the protocol’s functionality and effectiveness, and showcasing a reasonable trade-off between security and performance. By leveraging standards-based post-quantum cryptogra- phy, the proposed scheme enhances reliable and robust drone operations, effectively mitigat- ing various attacks beyond session establishment while safeguarding privacy and managing dynamic network events
- Keywords:
- Authentication ; Authenticated Group Key Exchange Protocol ; Lattice-Based Cryptography ; Post-Quantum Cryptography ; Drone ; Drone Networks ; Communication Security