期刊文献+

应急场景下无人机网络中的指令安全下发协议

Secure command delivery protocol for drone networks in emergency scenarios
下载PDF
导出
摘要 无人机在应急场景中发挥着越来越重要的作用。无人机执行远程任务时,飞行距离长,导致地面管控中心无法直接与无人机通信。而应急场景如突发的火灾地震等,需要及时下达指令应对。针对应急场景下的无人机网络数据指令安全下发场景,设计了一种基于多接收者加密协议的指挥权限下发机制和基于代理签密的指令安全下发机制。在地面管控中心下发指挥权限时,通过多接收者加密协议,向若干移动指挥中心下发指挥权限,并将其派往应急现场。在指令安全下发时,移动指挥中心将签密后的指令发送给空中平台,空中平台验证移动指挥中心的身份和指挥权限,并将指令签密后发送给无人机。网络中的无人机预先配置在空中平台的管辖下,无人机验证空中平台的身份,解密并执行指令。采用形式化验证工具Scyther、BAN逻辑和非形式化安全分析等多种方法对方案进行了安全性分析,结果表明,所提出的方案能够满足必要安全需求。与多个方案进行性能对比,结果表明,所提出的方案具有良好的性能表现。 Drones play an increasingly important role in emergency scenarios.When drones perform long-distance missions,the flight distance is long,which makes it impossible for the ground control center to communicate directly with the drones.Emergency scenarios such as sudden fires and earthquakes require timely instructions to respond.Aiming at the scenario of secure issuance of drone network data instructions in emergency scenarios,a command authority issuance mechanism based on a multi-receiver encryption protocol and a secure instruction issuance mechanism based on proxy signcryption are designed.When the ground control center issues command authority,it issues command authority to several mobile command centers through a multi-receiver encryption protocol and dispatches them to the emergency site.When the instruction is securely issued,the mobile command center sends the signed instruction to the aerial platform which verifies the identity and command authority of the mobile command center and sends the signed instruction to the drone.The drones in the network are pre-configured under the jurisdiction of the aerial platform.The drone verifies the identity of the aerial platform,decrypts and executes the instruction.A security analysis of the scheme is carried out using a variety of methods such as the formal verification tool Scyther,BAN logic and informal security analysis.The results show that the proposed scheme can meet the necessary security requirements.Compared with multiple schemes,the results show that the proposed scheme has a good performance.
作者 刘璐瑶 周雨辰 曹进 马如慧 尤伟 李晖 LIU Luyao;ZHOU Yuchen;CAO Jin;MA Ruhui;YOU Wei;LI Hui(School of Cyber Engineering,Xidian University,Xi’an 710126,China;State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710126,China)
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2024年第5期201-216,共16页 Journal of Xidian University
基金 西安导航技术研究所企业资助项目。
关键词 应急场景 无人机网络 指令安全下发 认证 emergency scenarios drone network safe delivery of instructions authentication
  • 相关文献

参考文献3

二级参考文献40

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 2Zhang k Threshold proxy signature schemes. In: Proc. of the 1997 Information Security Workshop. Japan, 1997. 191-197.
  • 3Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527-528.
  • 4Huang XY, Mu Y, Susilo W, Zhang FT. Short designated verifier proxy signature from pairings. In: Proc. of the SecUbiq 2005. LNCS3823, Nagasaki, Springer-Verlag, 2005. 835-844.
  • 5Zhang FG, Kim-K. Efficient 1D-based-blind signature and proxy signature from bilinear pairings. In: Safavi-Naini R, Seberry J, eds. Proc. of the ACISP 2003. LNCS 2727, Springer-Verlag, 2003. 312-323.
  • 6Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Prec. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473.
  • 7Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Proc. of the Acisp 2007. LNCS 4586, Springer-Verlag, 2007. 308-322.
  • 8Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Springer-Verlag, 2006. 293-308.
  • 9Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005,45(1 ):76-83.
  • 10Lu R, He D, Wang CJ. Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings. In: Proe. of the 8th ACIS Int'l Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 2007. 285-290. doi: 10.1109/SNPD.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部