Skip to main content

Secure Authentication Protocol for Drones in LTE Networks

  • Conference paper
  • First Online:
Advances in Security, Networks, and Internet of Things

Abstract

As LTE networks account for more than 50% of GSM subscribers in 2020, drone pilots have used LTE for communication with drones. The pilots could operate the drones in large spaces, and the possibility of using drones has spontaneously increased in various industries with LTE. If a malicious adversary exploits the leakage of the IMSI of drones, which existed as a security threat in the LTE networks, it may be vulnerable to the location privacy and security of the drone. In this paper, we define the architecture of drones using LTE networks, and show that the plaintext IMSI leaks out of LTE networks. Later, while using the LTE network, we explain that the leakage of IMSI poses a threat to drone location privacy and security. Next, we propose a protocol for the drone authentication in LTE that would improve the security of drones, especially related to location privacy. Finally, we formally specify the proposed authentication protocol and verify that the proposed protocol satisfies the security properties by using the protocol verification tool Scyther.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Overview â‹… mavlink developer guide (nd). https://mavlink.io/en/protocol/overview.html

  2. 3GPP TS 23.003: Technical Specification Group Core Network and Terminals; Numbering, addressing and identification (Release 16) (2020). http://www.3gpp.org/dynareport/23003.htm

  3. 3GPP TS 23.401: Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (Release 16) (2020). http://www.3gpp.org/dynareport/23401.htm

  4. 3GPP TS 23.402: Technical Specification Group Services and System Aspects; Architecture enhancements for non-3GPP accesses (Release 16) (2019). http://www.3gpp.org/dynareport/23402.htm

  5. M.A. Abdrabou, A.D.E. Elbayoumy, E.A. El-Wanis, LTE authentication protocol (EPS-AKA) weaknesses solution, in 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS) (IEEE, New York, 2015), pp. 434–441

    Google Scholar 

  6. J. Cao, M. Ma, H. Li, Y. Zhang, Z. Luo, A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv. Tutor. 16(1), 283–302 (2013)

    Article  Google Scholar 

  7. J. Cichonski, J. Franklin, M. Bartock, Guide to LTE security. Tech. rep., National Institute of Standards and Technology (2016)

    Google Scholar 

  8. C.J. Cremers, The scyther tool: verification, falsification, and analysis of security protocols, in International Conference on Computer Aided Verification (Springer, New York, 2008), pp. 414–418

    Google Scholar 

  9. C. Cremers, Scyther user manual. Department of Computer Science, University of Oxford, Oxford (2014)

    Google Scholar 

  10. C. Cremers, S. Mauw, Operational semantics, in Operational Semantics and Verification of Security Protocols (Springer, New York, 2012), pp. 13–35

    Book  Google Scholar 

  11. GSMA: The mobile economy (2020). https://www.gsma.com/mobileeconomy/

  12. W.B. Hsieh, J.S. Leu, Design of a time and location based one-time password authentication scheme, in 2011 7th International Wireless Communications and Mobile Computing Conference (IEEE, New York, 2011), pp. 201–206

    Google Scholar 

  13. D.F. Kune, J. Koelndorfer, N. Hopper, Y. Kim, Location leaks on the GSM air interface. ISOC NDSS (Feb 2012) (2012)

    Google Scholar 

  14. G. Lowe, A hierarchy of authentication specifications, in Proceedings 10th Computer Security Foundations Workshop (IEEE, New York, 1997), pp. 31–43

    Google Scholar 

  15. M. McFarland, Amazon makes its first drone delivery in the U.K (2016). https://money.cnn.com/2016/12/14/technology/amazon-drone-delivery/index.html

  16. S.L. McFarland, T.D. Biddle, ISIS-international review devoted to the history of science and its cultural influence, in America’s Pursuit of Precision Bombing, 1910–1945, vol. 87(2) (Smithsonian Institution Press, Washington, 1996), pp. 389–389

    Google Scholar 

  17. S.F. Mjølsnes, R.F. Olimid, Easy 4G/LTE IMSI catchers for non-programmers, in International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (Springer, New York, 2017), pp. 235–246

    Google Scholar 

  18. H.C. Nguyen, R. Amorim, J. Wigard, I.Z. Kovacs, P. Mogensen, Using LTE networks for UAV command and control link: a rural-area coverage analysis, in 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall) (IEEE, New York, 2017), pp. 1–6

    Google Scholar 

  19. K. Norrman, M. Näslund, E. Dubrova, Protecting IMSI and user privacy in 5G networks, in Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (2016), pp. 159–166

    Google Scholar 

  20. A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, J.P. Seifert, Practical attacks against privacy and availability in 4G/LTE mobile communication systems (2015). Preprint. arXiv:1510.07563

    Google Scholar 

  21. F. Van Den Broek, R. Verdult, J. de Ruiter, Defeating IMSI catchers, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), pp. 340–351

    Google Scholar 

  22. G. Wang, B. Lee, K. Lim, J. Ahn, Technical trends on security of control and non-payload communications network for unmanned aircraft systems. Electron. Telecommun. Trends 32(1), 82–92 (2017)

    Google Scholar 

Download references

Acknowledgements

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No.2018-0-00532, Development of High-Assurance (≥EAL6) Secure Microkernel).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dayoung Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kang, D., Lee, G., Choi, JY. (2021). Secure Authentication Protocol for Drones in LTE Networks. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71017-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71016-3

  • Online ISBN: 978-3-030-71017-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics