Authentication methods for UAV communication

M Rodrigues, J Amaro, FS Osório… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
M Rodrigues, J Amaro, FS Osório, BK RLJC
2019 IEEE symposium on computers and communications (ISCC), 2019ieeexplore.ieee.org
Unmanned Aerial Systems (UASs) are being employed in many different applications, and
with the increased usage security concerns become more accentuated. Communication
links are core components of a UAS, and providing a secure communication channel is a
necessity in which Authentication strategies play a major role. However, resource-
constrained devices cannot adopt off-the-shelf security strategies that were not developed
taking into account those devices' constraints. Because of that, new security strategies …
Unmanned Aerial Systems (UASs) are being employed in many different applications, and with the increased usage security concerns become more accentuated. Communication links are core components of a UAS, and providing a secure communication channel is a necessity in which Authentication strategies play a major role. However, resource-constrained devices cannot adopt off-the-shelf security strategies that were not developed taking into account those devices' constraints. Because of that, new security strategies, including authentication, were purposed for these applications. In this paper, we analyze and compare two authentication protocols developed for WSNs and modified for UAV usage. Tests were performed analyzing time execution and CPU usage on security-specific operation such as hash tables and elliptic curve operations.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果