Secure Key Agreement Protocol for Multi-Drone Communication
Varshini P.1, Lakshmy K.V.2

1Varshini P*, TIFAC-CORE in Cyber Security, Amrita School of Engineering, Amrita Vishwa Vidyapeetham University, Coimbatore, India.
2Lakshmy K.V., TIFAC-CORE in Cyber Security, Amrita School of Engineering, Amrita Vishwa Vidyapeetham University, Coimbatore, India.
Manuscript received on January 12, 2020. | Revised Manuscript received on January 30, 2020. | Manuscript published on March 30, 2020. | PP: 6-10 | Volume-8 Issue-6, March 2020. | Retrieval Number: F6979038620/2020©BEIESP | DOI: 10.35940/ijrte.F6979.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Unmanned Aerial Vehicles (UAV), or Drone communication, are developing areas of research that can be used in fields of military, hospital or agriculture. Drone communication keeps up associations among drones and a ground station with a satisfactory information rate for sustaining ongoing transmissions. The communication is imparted between one another through RF. This communication is over the air and it should be encrypted. This guarantees an attacker can’t comprehend the caught data. The ongoing research areas focus on efficiently encrypting the channel to make it secure and reducing the dependency on GCS for key generation. This paper proposes a key trade protocol for secure drone to drone communication. Normally in a drone communication, the communication between the Ground Control Station(GCS) and the drones are encrypted utilizing the URANUS Link protocol. The drone to drone communication occurs through the ground station which takes a lot of communication time and resources. Additionally, if an immediate drone to drone communication is built up it is significantly decoded or sets aside the need for effective and secure key generation functions. To overcome the previously mentioned issue the proposed protocol defeats the computation and storage issues by utilizing parameters like Drone ID(DID), Mission ID(MID), Timestamp and Nonce alongside hashing capacities for the key age and communication process. The proposed protocol consists of three phases: i)Registration- the new drones are assigned with DID and MID after registering with the GCS ii)Group-Key Generation- the key is generated using hash functions and iii) Communication Establishment- the keys are exchanged and verified before the communication starts. This protocol guarantees forward secrecy, reverse secrecy and insurance from attacks like eavesdropping, spoofing, replay, and physical capture attacks. AVISPA is utilized for the security examination of the protocol.
Keywords: AVISPA, Drone, GCS, Hashing, Secure, URANUS Link.
Scope of the Article: Secure Mobile and Multi-Agent Systems