4.6 Article

Authentication and Delegation for Operating a Multi-Drone System

Journal

SENSORS
Volume 19, Issue 9, Pages -

Publisher

MDPI
DOI: 10.3390/s19092066

Keywords

Internet of Things; key management; authentication and delegation; drones control

Funding

  1. Human Resources program in Energy Technology of the Korea Institute of Energy Technology Evaluation and Planning (KETEP) from the Ministry of Trade, Industry & Energy, Republic of Korea [20174030201820]
  2. Korea Evaluation Institute of Industrial Technology (KEIT) [20174030201820] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators. If a drone is illegally captured, some important data will be exposed to the attacker. In this paper, we propose a saveless-based key management and delegation system for a multi-drone control system. The proposed system enables a multi-drone control system to highly resist physical capture by minimizing exposure of confidential data. In addition, when the drone leaves the formation for performing another mission or by a natural environment, the system can allow the drone to securely re-participate in the formation with the help of the ground control station (GCS) when it comes back. The analysis result shows that the proposed system can reduce storage space usage and require less computational overhead. From the result, we expect that the system can guarantee the resistance of physical capture and secure key management to the drones as well as many mobile IoT devices.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available