Font Size: a A A

Research And Design Of Communication Privacy Protection Scheme For UAV Network

Posted on:2024-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:J H WangFull Text:PDF
GTID:2542307079466094Subject:Electronic information
Abstract/Summary:PDF Full Text Request
In recent years,UAV application technology has become increasingly mature,and UAV network has been applied in many fields,bringing great convenience to people’s life and work.However,the exposed working environment and fragile control system of UAV equipment bring more and more significant security risks to UAV network communication,so it is urgent to study targeted communication privacy protection technology.Identity authentication is an effective way to ensure the privacy and security of communication,and is the premise of network communication security and sensitive data access.As one of the privacy protection measures,authentication and key negotiation protocol can ensure the mutual authentication,anonymity and other important security attributes of UAV network communication,and at the same time provide resistance to many types of active attacks.In recent years,researchers have proposed a series of authentication and key negotiation protocols for the Internet of Things scenario.However,these protocols either have low operating efficiency or design defects in security,and cannot be well applied to the UAV network communication environment with complex communication environment,limited node resources and strong network topology changes.In view of the above situation,this thesis focuses on the authentication and key negotiation protocols in UAV network communication environment,conducts in-depth investigation and analyzes the privacy protection needs and security challenges faced by this scenario,and designs two security protocols with comprehensive security and efficient operation under different sub-scenarios:(1)Aiming at the design of secure and efficient authentication and key negotiation protocol in the scenario of network communication between users and drones,this thesis firstly analyzes the privacy protection and security requirements in this scenario in detail,and defines the design objectives of the protocol.Then,the user ID,password and biometric characteristics in the identity encryption authentication scheme are introduced as the user credentials.Based on ECC algorithm,the basic scheme is constructed by taking advantage of the difficulty of discrete logarithm problem on elliptic curve.In addition,the efficiency of elliptic curve dot multiplication operation is improved by combining BPV prediction technology,which further reduces the resource cost while ensuring the protocol security.The security analysis results based on ROR model,proverif tool and non-formal analysis method,as well as the analysis and comparison results in terms of computation cost and communication overhead,show that the designed protocol achieves a good balance between security and availability.(2)Aiming at the protocol design problem of the communication scenario between the nodes of UAV network,this thesis combined the non-ideal PUF and fuzzy extractor,completed the scheme construction through lightweight XOR and hash operation,and adopted multiple PUFs to improve the protocol security.This protocol can effectively solve the problem of noise interference of non-ideal PUF.The security evaluation results based on BAN logic,proverif tool and non-formal analysis method show that the designed protocol can resist many common active attacks in UAV networks such as behavior simulation attacks and node tampering attacks while ensuring important security attributes such as anonymity and mutual authentication,thus ensuring the privacy and security of communication within the network.In addition,the performance comparison results show that this protocol has advantages in computing overhead and communication overhead,and meets the lightweight design requirements.
Keywords/Search Tags:UAV Network, Identity Authentication, Key Agreement, Elliptic Curve Cryptography Algorithm, Physically Unclonable Function
PDF Full Text Request
Related items