Peer2Peer Mutual Authentication-Attestation Protocol in UAV Swarms. Bansal, G. & Sikdar, B. IEEE Transactions on Vehicular Technology, IEEE, Review.
abstract   bibtex   
Unmanned Aerial Vehicles (UAVs) have a diverse range of social, economic, and military uses. However, since UAVs communicate through wireless technology, they are susceptible to security attacks. Establishing trust among UAVs is one of the most critical security elements for mitigating these risks in UAV networks. However, due to UAVs' limited resources, implementing conventional trust-building methods in UAV networks becomes difficult. Additionally, as the number of UAVs grows, this problem becomes more serious. To overcome this problem, we propose a lightweight authentication cum attestation system for UAV swarms. The protocol is based on using a formal Mao Boyd logic method, we show that the proposed protocol is feasible, scalable, and secure. Comparative studies demonstrate that the suggested protocol outperforms the current state-of-the-art.
@article{P2P,
  title={Peer2Peer Mutual Authentication-Attestation Protocol in UAV Swarms},
  author={Bansal, Gaurang and Sikdar, Biplab},
  journal={IEEE Transactions on Vehicular Technology},
  publisher={IEEE},
  impactfactor={5.3},
  year={Review},
  abstract={
    Unmanned Aerial Vehicles (UAVs) have a diverse range of social, economic, and military uses. However, since UAVs communicate through wireless technology, they are susceptible to security attacks. Establishing trust among UAVs is one of the most critical security elements for mitigating these risks in UAV networks. However, due to UAVs' limited resources, implementing conventional trust-building methods in UAV networks becomes difficult. Additionally, as the number of UAVs grows, this problem becomes more serious. To overcome this problem, we propose a lightweight authentication cum attestation system for UAV swarms. The protocol is based on using a formal Mao Boyd logic method, we show that the proposed protocol is feasible, scalable, and secure. Comparative studies demonstrate that the suggested protocol outperforms the current state-of-the-art.
  }
}

Downloads: 0