Muslum Ozgur Ozmen, Habiba Farrukh, Hyungsub Kim, Antonio Bianchi, Z. Berkay Celik (Purdue University)

Drone swarms are becoming increasingly prevalent in important missions, including military operations, rescue tasks, environmental monitoring, and disaster recovery. Member drones coordinate with each other to efficiently and effectively accomplish a given mission. To automatically coordinate a swarm, member drones exchange critical messages (e.g., their positions, locations of identified obstacles, and detected search targets) about their observed environment and missions over wireless communication channels. Therefore, swarms need a pairing system to establish secure communication channels that protect the confidentiality and integrity of the messages. However, swarm properties and the open physical environment in which they operate bring unique challenges in establishing cryptographic keys between drones.

In this paper, we first outline an adversarial model and the ideal design requirements for secure pairing in drone swarms. We then survey existing human-in-the-loop-based, context-based, and public key cryptography (PKC) based pairing methods to explore their feasibility in drone swarms. Our exploration, unfortunately, shows that existing techniques fail to fully meet the unique requirements of drone swarms. Thus, we propose research directions that can meet these requirements for secure, energy-efficient, and scalable swarm pairing systems.

View More Papers

Ethical Challenges in Blockchain Network Measurement Research

Yuzhe Tang (Syracuse University), Kai Li (San Diego State University), and Yibo Wang and Jiaqi Chen (Syracuse University)

Read More

A Transcontinental Analysis of Account Remediation Protocols of Popular...

Philipp Markert (Ruhr University Bochum), Andrick Adhikari (University of Denver), Sanchari Das (University of Denver)

Read More

GPS Spoofing Attack Detection on Intersection Movement Assist using...

Jun Ying (Purdue University), Yiheng Feng (Purdue University), Qi Alfred Chen (University of California, Irvine), Z. Morley Mao (University of Michigan)

Read More

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks...

Hadi Abdullah (Visa Research), Aditya Karlekar (University of Florida), Saurabh Prasad (University of Florida), Muhammad Sajidur Rahman (University of Florida), Logan Blue (University of Florida), Luke A. Bauer (University of Florida), Vincent Bindschaedler (University of Florida), Patrick Traynor (University of Florida)

Read More