skip to main content

Title: Efficient Authentication of Drones to mmWave Wireless Mesh Networks in Post-Disaster Scenarios
Unmanned Aerial Vehicles (UAVs), or drones, are increasingly being utilized for public safety circumstances including post-disaster recovery of destroyed communication infrastructure. For instance, drones are temporarily positioned within an affected area to create a wireless mesh network among public safety personnel. To serve the need for high-rate video-based damage assessment, drone-assisted communication can utilize high- bandwidth millimeter wave (mmWave) technologies such as IEEE 802.11ad. However, short-range mmWave communication makes it hard for optimally- positioned drones to be authenticated with a centralized network control center. Therefore and assuming that there are potential imposters, we propose two lightweight and fast authentication mechanisms that take into account the physical limitations of mmWave communication. First, we propose a drone-to-drone authentication mechanism, which is based on proxy signatures from a control center. Accordingly, any newly joining drone can authenticate itself to an exist one rather than attempting to authenticate to the outof-reach control center. Second, we propose a drone-to- ground authentication mechanism, to enable each drone to authenticate itself to its associated ground users. Such authentication approach is based on challenge-response broadcast type, and it is still utilizing fast proxy signature approach. The evaluation of the proposed authentication mechanisms, conducted using NS-3 implementation of IEEE more » 802.11ad protocol, show their efficiency and practicality. « less
; ; ;
Award ID(s):
Publication Date:
Journal Name:
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
Page Range or eLocation-ID:
1 to 6
Sponsoring Org:
National Science Foundation
More Like this
  1. As 5G systems are starting to be deployed and becoming part of many daily life applications, there is an increasing interest on the security of the overall system as 5G network architecture is significantly different than LTE systems. For instance, through application specific virtual network slices, one can trigger additional security measures depending on the sensitivity of the running application. Drones utilizing 5G could be a perfect example as they pose several safety threats if they are compromised. To this end, we propose a stronger authentication mechanism inspired from the idea of second-factor authentication in IT systems. Specifically, once the primary 5G authentication is executed, a specific slice can be tasked to trigger a second-factor authentication utilizing different factors from the primary one. This trigger mechanism utilizes the re-authentication procedure as specified in the 3GPP 5G standards for easy integration. Our second-factor authentication uses a special challenge-response protocol, which relies on unique drone digital ID as well as a seed and nonce generated from the slice to enable freshness. We implemented the proposed protocol in ns-3 that supports mmWave-based communication in 5G. We demonstrate that the proposed protocol is lightweight and can scale while enabling stronger security for the drones.
  2. mmWave communication in 60GHz band has been recognized as an emerging technology to support various bandwidth-hungry applications in indoor scenarios. To maintain ultra-high throughputs while addressing potential blockage problems for mmWave signals, maintaining line-of-sight (LoS) communications between client devices and access points (APs) is critical. To maximize LoS communications, one approach is to deploy multiple APs in the same room. In this paper, we investigate the optimal placement of multiple APs using both analytical methods and simulations. Considering the uncertainty of obstacles and clients, we focus on two typical indoor settings: random-obstacle-random-client (RORC) scenarios and fixed-obstacle-random-client (FORC) scenarios. In the first case, we analytically derive the optimal positions of APs by solving a thinnest covering problem. This analytical result is used to show that deploying up to 5 APs in a specific room brings substantial performance gains. For the FORC scenario, we propose the shadowing-elimination search (SES) algorithm based on an analytic model to efficiently determine the placement of APs. We show, through simulations, that with only a few APs, the network can achieve blockage-free operation in the presence of multiple obstacles and also demonstrate that the algorithm produces near-optimal deployments. Finally, we perform ns-3 simulations based on the IEEEmore »802.11ad protocol at mmWave frequency to validate our analytical results. The ns-3 results show that proposed multi-AP deployments produce significantly higher aggregate performance as compared to other common AP placements in indoor scenarios.« less
  3. As the drone becomes widespread in numerous crucial applications with many powerful functionalities (e.g., reconnaissance and mechanical trigger), there are increasing cases related to misused drones for unethical even criminal activities. Therefore, it is of paramount importance to identify these malicious drones and track their origins using digital forensics. Traditional drone identification techniques for forensics (e.g., RF communication, ID landmarks using a camera, etc.) require high compliance of drones. However, malicious drones will not cooperate or even spoof these identification techniques. Therefore, we present an exploration for a reliable and passive identification approach based on unique hardware traits in drones directly (e.g., analogous to the fingerprint and iris in humans) for forensics purposes. Specifically, we investigate and model the behavior of the parasitic electronic elements under RF interrogation, a particular passive parasitic response modulated by an electronic system on drones, which is distinctive and unlikely to counterfeit. Based on this theory, we design and implement DroneTrace, an end-to-end reliable and passive identification system toward digital drone forensics. DroneTrace comprises a cost-effective millimeter-wave (mmWave) probe, a software framework to extract and process parasitic responses, and a customized deep neural network (DNN)-based algorithm to analyze and identify drones. We evaluate the performancemore »of DroneTrace with 36 commodity drones. Results show that DroneTrace can identify drones with the accuracy of over 99% and an equal error rate (EER) of 0.009, under a 0.1-second sensing time budget. Moreover, we test the reliability, robustness, and performance variation under a set of real-world circumstances, where DroneTrace maintains accuracy of over 98%. DroneTrace is resilient to various attacks and maintains functionality. At its best, DroneTrace has the capacity to identify individual drones at the scale of 104 with less than 5% error.« less
  4. Millimeter-wave (mmWave) with large spectrum available is considered as the most promising frequency band for future wireless communications. The IEEE 802.11ad and IEEE 802.11ay operating on 60 GHz mmWave are the two most expected wireless local area network (WLAN) technologies for ultra-high-speed communications. For the IEEE 802.11ay standard still under development, there are plenty of proposals from companies and researchers who are involved with the IEEE 802.11ay task group. In this survey, we conduct a comprehensive review on the medium access control layer (MAC) related issues for the IEEE 802.11ay, some cross-layer between physical layer (PHY) and MAC technologies are also included. We start with MAC related technologies in the IEEE 802.11ad and discuss design challenges on mmWave communications, leading to some MAC related technologies for the IEEE 802.11ay. We then elaborate on important design issues for IEEE 802.11ay. Specifically, we review the channel bonding and aggregation for the IEEE 802.11ay, and point out the major differences between the two technologies. Then, we describe channel access and channel allocation in the IEEE 802.11ay, including spatial sharing and interference mitigation technologies. After that, we present an in-depth survey on beamforming training (BFT), beam tracking, single-user multiple-input-multiple-output (SU-MIMO) beamforming and multi-user multiple-input-multiple-outputmore »(MU-MIMO) beamforming. Finally, we discuss some open design issues and future research directions for mmWave WLANs. We hope that this paper provides a good introduction to this exciting research area for future wireless systems.« less
  5. To address the needs of emerging bandwidth-intensive applications in 5G and beyond era, the millimeter-wave (mmWave) band with very large spectrum availability have been recognized as a promising choice for future wireless communications. In particular, IEEE 802.11ad/ay operating on 60 GHz carrier frequency is a highly anticipated wireless local area network (WLAN) technology for supporting ultra-high-rate data transmissions. In this paper, we describe additions to the ns-3 802.11ad simulator that include 3D obstacle specifications, line-of-sight calculations, and a sparse cluster-based channel model, which allow researchers to study complex mmWave Wi-Fi network deployments under more realistic conditions. We also study the performance accuracy and simulation efficiency of the implemented statistical channel model as compared to a deterministic ray-tracing based channel model. Through extensive ns-3 simulations, the results show that the implemented channel model has the potential to achieve good accuracy in performance evaluation while improving simulation efficiency. We also provide a detailed parametric analysis on the statistical channel model, which yields insight on how to properly tune the model parameters to further improve performance accuracy.