Abstract
Drones are being diversely used in various areas due to their low price. Most of the use cases demand a secure and reliable wireless communication infrastructure to ensure the quality of service. Such demand boosts the deployment of drones in 5G cellular network. The ground base station (BS) is the main component associated with drones in the 5G cellular network. However, the BS in 5G currently broadcasts the system information message without authentication protection. This poses serious security concerns as the system information message will be used to build connection between the BS and cellular devices. Particularly, adversaries can masquerade as BSs, connect drones, and obtain the data captured by them. Although some attacks have been prevented due to the recent enhancements for 5G cellular protocols, the root vulnerability for the bootstrap phase between drones and the BS still existed and not fixed yet.
In this work, we consider a scenario where drones are used in a sport venue to capture the match and 5G cellular network is used to disseminate the live stream. To protect drones from fake BSs, we adopt and optimise the authentication protocol proposed by Singla et al. in [26]. Basically, we modify its architecture by deploying aerial balloon drone BSs over the sport venues to provide more reliable communication service. Moreover, we optimise the verification process in order to reduce the computation overhead on drones. We implemented a prototype of the protocol and evaluated its performance. The experiment results show our authentication protocol is practical to be adopted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Specification number TR 33.809 version 0.8.0. In: Study on 5G security enhancements against false base stations. 3GPP (2020)
Alrashede, H., Shaikh, R.A.: IMSI catcher detection method for cellular networks. In: 2019 2nd International Conference on Computer Applications and Information Security (ICCAIS), pp. 1–6. IEEE (2019)
BlueKrypt: Cryptographic key length recommendation. https://www.keylength.com/en/4/. Accessed 14 June 2021
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004). https://doi.org/10.1007/s00145-004-0314-9
Boyd, C. (ed.): ASIACRYPT 2001. LNCS, vol. 2248. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1
Cheng, Z.: The SM9 cryptographic schemes. IACR Cryptol. ePrint Arch. 2017, 117 (2017). http://eprint.iacr.org/2017/117
Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.R.: IMSI-catch me if you can: IMSI-catcher-catchers. In: Jordan, C.N.P., Hahn, A., Butler, K.R.B., Sherr, M. (eds.) Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, 8–12 December 2014, pp. 246–255. ACM (2014). https://doi.org/10.1145/2664243.2664272
Gentry, C., Silverberg, A.: Hierarchical ID-Based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_34
Gharsallah, I., Smaoui, S., Zarai, F.: A secure efficient and lightweight authentication protocol for 5G cellular networks: Sel-aka. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1311–1316. IEEE (2019)
Google loon project main page (2011). https://loon.com/. Accessed 23 April 2021
Mbbf2017 connected aerial vehicle live (2017). https://www.huawei.com/au/technology-insights/industry-insights/outlook/mobile-broadband/xlabs/use-cases/mbbf2017-connected-aerial-vehicle-live. Accessed 23 April 2021
Huo, Y., Dong, X., Lu, T., Xu, W., Yuen, M.: Distributed and multi-layer UAV network for the next-generation wireless communication (2018)
Hussain, S.R., Echeverria, M., Chowdhury, O., Li, N., Bertino, E.: Privacy attacks to the 4G and 5g cellular paging protocols using side channel information. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, 24–27 February 2019. The Internet Society (2019)
Hussain, S.R., Echeverria, M., Singla, A., Chowdhury, O., Bertino, E.: Insecure connection bootstrapping in cellular networks: the root of all evil. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, 15–17 May 2019, pp. 1–11. ACM (2019). https://doi.org/10.1145/3317549.3323402
Jin, J., Lian, C., Xu, M.: Rogue base station detection using a machine learning approach. In: 28th Wireless and Optical Communications Conference, WOCC 2019, Beijing, China, 9–10 May 2019, pp. 1–5. IEEE (2019). https://doi.org/10.1109/WOCC.2019.8770554
Lilly, A.: IMSI catchers: hacking mobile communications. Netw. Secur. 2017(2), 5–7 (2017). https://doi.org/10.1016/S1353-4858(17)30014-4
Maguire, Y.: Building communications networks in the stratosphere (2015). https://engineering.fb.com/2015/07/30/connectivity/building-communications-networks-in-the-stratosphere/. Accessed 23 April 2021
Mortimer, G.: Stadiums and arenas are keeping the good drones in, and the spies out with dedrone (2017). https://www.suasnews.com/2017/03/stadiums-arenas-keeping-good-drones-spies-dedrone/. Accessed 23 April 2021
Naqvi, S.A.R., Hassan, S.A., Pervaiz, H., Ni, Q.: Drone-aided communication as a key enabler for 5G and resilient public safety networks. IEEE Commun. Mag. 56(1), 36–42 (2018). https://doi.org/10.1109/MCOM.2017.1700451
Nassi, B., Shabtai, A., Masuoka, R., Elovici, Y.: Sok - security and privacy in the age of drones: Threats, challenges, solution mechanisms, and scientific gaps. CoRR abs/1903.05155 (2019). http://arxiv.org/abs/1903.05155
Pycrypto 2.6.1. https://pypi.org/project/pycrypto/. Accessed 14 June 2021
Python 3.7.0. https://www.python.org/downloads/release/python-370/. Accessed 14 June 2021
Research, Markets: Global cellular-connected drone market analysis and forecast, 2020–2023 and 2030 (2020). https://www.globenewswire.com/en/news-release/2020/10/30/2117598/28124/en/Global-Cellular-Connected-Drone-Market-Analysis-Forecast-2020-2023-2030.html. Accessed 13 June 13 2021
Shaik, A., Borgaonkar, R., Park, S., Seifert, J.: On the impact of rogue base stations in 4G/LTE self organizing networks. In: Papadimitratos, P., Butler, K.R.B., Pöpper, C. (eds.) Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, 18–20 June 2018, pp. 75–86. ACM (2018). https://doi.org/10.1145/3212480.3212497
Shaik, A., Borgaonkar, R., Park, S., Seifert, J.: New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, 15–17 May 2019, pp. 221–231. ACM (2019). https://doi.org/10.1145/3317549.3319728
Singla, A., Behnia, R., Hussain, S.R., Yavuz, A.A., Bertino, E.: Look before you leap: Secure connection bootstrapping for 5g networks to defend against fake base-stations. In: Cao, J., Au, M.H., Lin, Z., Yung, M. (eds.) ASIA CCS 2021: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, 7–11 June 2021, pp. 501–515. ACM (2021)
Ullah, H., Nair, N.G., Moore, A., Nugent, C.D., Muschamp, P., Cuevas, M.: 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access 7, 37251–37268 (2019). https://doi.org/10.1109/ACCESS.2019.2905347
Yang, G., et al.: A telecom perspective on the internet of drones: From LTE-advanced to 5G. CoRR abs/1803.11048 (2018)
Zeng, Y., Lyu, J., Zhang, R.: Cellular-connected UAV: potential, challenges, and promising technologies. IEEE Wirel. Commun. 26(1), 120–127 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, S., Cui, S., Liu, J. (2021). A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones. In: Yuan, X., Bao, W., Yi, X., Tran, N.H. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-91424-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-91424-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91423-3
Online ISBN: 978-3-030-91424-0
eBook Packages: Computer ScienceComputer Science (R0)