A^2RID – Anonymous Direct Authentication and Remote Identification of Commercial Drones

10/21/2022
by   Eva Wisse, et al.
0

The recent worldwide introduction of RemoteID (RID) regulations forces all Unmanned Aircrafts (UAs), a.k.a. drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting and monitoring purposes. Although improving drones' monitoring and situational awareness, the RID rule also generates significant privacy concerns for UAs' operators, threatened by the ease of tracking of UAs and related confidentiality and privacy concerns connected with the broadcasting of plaintext identity information. In this paper, we propose A^2RID, a protocol suite for anonymous direct authentication and remote identification of heterogeneous commercial UAs. A^2RID integrates and adapts protocols for anonymous message signing to work in the UA domain, coping with the constraints of commercial drones and the tight real-time requirements imposed by the RID regulation. Overall, the protocols in the A^2RID suite allow a UA manufacturer to pick the configuration that best suits the capabilities and constraints of the drone, i.e., either a processing-intensive but memory-lightweight solution (namely, CS-A^2RID) or a computationally-friendly but memory-hungry approach (namely, DS-A^2RID). Besides formally defining the protocols and formally proving their security in our setting, we also implement and test them on real heterogeneous hardware platforms, i.e., the Holybro X-500 and the ESPcopter, releasing open-source the produced code. For all the protocols, we demonstrated experimentally the capability of generating anonymous RemoteID messages well below the time bound of 1 second required by RID, while at the same time having quite a limited impact on the energy budget of the drone.

READ FULL TEXT

page 1

page 5

page 11

page 12

page 15

research
01/11/2019

Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis

We propose PiNcH, a methodology to detect the presence of a drone and it...
research
05/27/2022

Hide and Seek – Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles

Due to the frequent unauthorized access by commercial drones to Critical...
research
03/26/2020

Concerning Quantum Identification Without Entanglement

Identification schemes are interactive protocols typically involving two...
research
08/04/2022

Identity-Based Authentication for On-Demand Charging of Electric Vehicles

Dynamic wireless power transfer provides means for charging Electric Veh...
research
08/01/2021

Remote quantum-safe authentication of entities with physical unclonable functions

Physical unclonable functions have been shown a useful resource of rando...
research
01/10/2023

The Evolution of Real-time Remote Intraoperative Neurophysiological Monitoring (IONM)

Real-time monitoring of nervous system function with immediate communica...
research
07/21/2020

PISTIS: From a Word-of-Mouth to a Gentleman's Agreement

The accelerated digitalisation of society along with technological evolu...

Please sign up or login with your details

Forgot password? Click here to reset