PIC: Preserving Data Integrity in UAV Assisted Communication

IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)(2022)

引用 1|浏览13
暂无评分
摘要
The use of unmanned aerial vehicles (UAVs) for diverse activities has increased rapidly in recent years. Nonetheless, if operational cyber security is not handled effectively, these technologies offer a significant hazard which can cause catas-trophic harm. Therefore it is important to identify the potential attacks that can be implemented by an adversary. Traditional methods for data integrity designed for the Internet are not suitable for UAV assisted vehicular or wireless sensor networks due to the high communication overhead and latency required. This paper proposes a lightweight data integrity technique called PIC to address this problem. Every device, at regular intervals, generates an authentication parameter that depends on the packets transmitted. The authentication parameters are only delivered to a central server or the destination device where the integrity of the packets is verified. The proposed algorithm, i.e., PIC, does not include computationally expensive cryptographic algorithms. Therefore, the overhead introduced by embedding message authentication code (MAC) to every transmitted packet is significantly reduced. A formal security proof is presented in this paper to demonstrate the robustness of PIC, i.e., the PIC can identify malicious UAVs effectively. A performance analysis using NS-3 is also presented to show that PIC detects malicious UAVs with minimum communication overhead and latency.
更多
查看译文
关键词
destination device,PIC,computationally expensive cryptographic algorithms,message authentication code,transmitted packet,formal security proof,malicious UAV,minimum communication overhead,preserving data integrity,UAV assisted communication,unmanned aerial vehicles,diverse activities,operational cyber security,significant hazard,potential attacks,wireless sensor networks,high communication overhead,lightweight data integrity technique,authentication parameter,catastrophic harm
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要