Abstract
The recent worldwide introduction of RemoteID (RID) regulations forces all unmanned aircrafts (UAs), also known as drones, to broadcast in plaintext on the wireless channel their identity and real-time location, for accounting and monitoring purposes. Although improving drones' monitoring and situational awareness, the RID rule also generates significant privacy concerns for UAs' operators, threatened by the ease of tracking of UAs and related confidentiality and privacy concerns connected with the broadcasting of plaintext identity information. In this article, we propose anonymous direct authentication and remote identification (A2RID), a protocol suite for A2RID of heterogeneous commercial UAs. 2RID integrates and adapts protocols for anonymous message signing to work in the UA domain, coping with the constraints of commercial drones and the tight real-time requirements imposed by the RID regulation. Overall, the protocols in the 2RID suite allow a UA manufacturer to pick the configuration that best suits the capabilities and constraints of the drone, i.e., either a processing-intensive but memory-lightweight solution (namely, CS-2RID) or a computationally friendly but memory-hungry approach (namely, DS-2RID). Besides formally defining the protocols and formally proving their security in our setting, we also implement and test them on real heterogeneous hardware platforms, i.e., the Holybro X-500 and the ESPcopter, releasing open-source the produced code. For all the protocols, we demonstrated experimentally the capability of generating anonymous RemoteID messages well below the time bound of 1 s required by RID, while at the same time having quite a limited impact on the energy budget of the drone.
Original language | English |
---|---|
Article number | 10029376 |
Pages (from-to) | 10587-10604 |
Number of pages | 18 |
Journal | IEEE Internet of Things Journal |
Volume | 10 |
Issue number | 12 |
DOIs | |
Publication status | Published - 15 Jun 2023 |
Keywords
- Applied Security and Privacy
- Drones
- Encryption
- Privacy
- Privacy-Enhancing Technologies
- Protocols
- Public key
- Regulation
- Security
- Unmanned Aerial Vehicles
- unmanned aerial vehicles
- privacy
- security
- Applied security and privacy
- privacy-enhancing technologies