A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions
نویسندگان
چکیده
A network of agents constituted multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, size constraints, ultra-mobile nature, non-trusted operational environments make them susceptible to various attacks, including physical capturing cloning attacks. robust resilient security protocol should be lightweight resource-efficient addition providing protection against tampering threats. This paper proposes an authentication for UAV-based multi-agent system threats adversaries, strong resistance The proposed based on unclonable function (PUF), well-known hardware primitive that utilized low-cost cryptographic key generation. analysis approach shows it provides cloning, exhibits scalability energy efficiency.
منابع مشابه
Digital Counts of Maize Plants by Unmanned Aerial Vehicles (UAVs)
Precision phenotyping, especially the use of image analysis, allows researchers to gain information on plant properties and plant health. Aerial image detection with unmanned aerial vehicles (UAVs) provides new opportunities in precision farming and precision phenotyping. Precision farming has created a critical need for spatial data on plant density. The plant number reflects not only the fina...
متن کاملUsing Physical Unclonable Functions for Hardware Authentication: A Survey
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security due to their special characteristics of simplicity and safety. However, their nature as well as early stage of study makes them constitute currently a diverse and non-standardized set for designers. This work tries to establish one organization of existing PUF structures, giving guidelines for the...
متن کاملOptimizing Trajectories for Unmanned Aerial Vehicles (UAVs) Patrolling the Border
At first glance, most aspects of border protection activity look like classical examples of zero-sum games, in which the interests of the two sides are exactly opposite. This is how such situations are planned now: this is how border patrol agents are assigned to different segments of the border, this is how routes of coast guard ships are planned, etc. However, there is a big difference betwee...
متن کاملSmall unmanned aerial vehicles (micro-UAVs, drones) in plant ecology1
PREMISE OF THE STUDY Low-elevation surveys with small aerial drones (micro-unmanned aerial vehicles [UAVs]) may be used for a wide variety of applications in plant ecology, including mapping vegetation over small- to medium-sized regions. We provide an overview of methods and procedures for conducting surveys and illustrate some of these applications. METHODS Aerial images were obtained by fl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11182921