skip to main content
10.1145/2935620.2935629acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

A Security Framework for a Drone Delivery Service

Published: 26 June 2016 Publication History

Abstract

Delivery drones are unmanned aerial vehicles (UAV) utilized to transport packages, food, medicine, or other goods. With high demand for a prompt and efficient delivery, a drone delivery system can be an effective solution for timely deliveries and especially for emergency management. However, current delivery drone systems lack crucial security functions. Drones may have to operate in unsupervised hostile areas, and therefore be vulnerable to physical capture in addition to conventional cyber attacks. A captured drone can be analyzed by a white-box attack model in which the attacker has full control over the execution environment of cryptographic modules in static and dynamic methods including all side-channel information. In this paper, we propose and evaluate a security framework which utilizes white-box cryptography in order to protect critical data and cryptographic keys in delivery drones from white-box attacks. The experimental results show that the proposed framework is cost effective in terms of resource usage and thus is suitable even for resource-limited UAV.

References

[1]
DHL. (2014, Sep. 24). DHL Press Release {Online}. http://www.dhl.com/en/press/releases/releases 2014/group/dhl parcelcopter launches initial operations for research purposes.html
[2]
Amazon. (2015). Amazon Air Prime {Online}. Available: http://www.amazon.com/b?node=8037720011
[3]
Lee Bell (2015, Apr. 01). The Inquirer {Online}. Available: http://www.theinquirer.net/inquirer/news/2402512/on- demand-drone-service-goes-live-in-london-for-gbp10-a-pop
[4]
Samy Kamkar (2013, Dec. 2). SkyJack {Online}. Available: http://samy.pl/skyjack/
[5]
S. Chow et al.,''White-Box Cryptography and an AES Implementation," Ninth Workshop Select. Areas in Cryptography (SAC 2002), Madrid, Spain, Mar. 11-14, 2002, pp. 250--270.
[6]
O. Billet, H. Gilbert, and C. Ech-Chatbi, ''Cryptanalysis of a White Box AES implementation," Eleventh Int. Conf. Select. Areas in Cryptography, Santa Fe, NM, USA, Mar. 13--17, 2005, pp. 227--240.
[7]
J. Bringer, H. Chabanne, and E. Dottax, ''White Box Cryptography: Another Attempt," IACR Cryptology ePrint Archive, vol. 2006, 2006, p.468.
[8]
Y.D. Mulder, P. Roelse, and B. Preneel, ''Cryptanalysis of the Xiao-Lai White-Box AES Implementation," Eighteenth Int. Conf. Select. Areas in Cryptography, Trento, Italy, Mar. 26-30, 2012, pp. 34--49.
[9]
Y.D. Mulder, B. Wyseur, and B. Preneel, ''Cryptanalysis of a Perturbated White-Box AES Implementation," INDOCRYPT, Hyderabad, India, Dec. 12, 2010, pp. 292--310.
[10]
T. Lepoint et al., ''Two Attacks on a White-Box AES Implementation," Ninth Int. Workshop Select. Areas in Cryptography, Coimbra, Portugal, Mar. 18-22, 2013, pp. 265--285.
[11]
S. Lee, D. Choi, and Y. Choi, ''Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES," ETRI Journal, vol.37, Oct'15.
[12]
J. Cho, K.Y. Choi, and D. Moon, ''Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography," IACR eprint archive, 2015/800, Sept. 2015.
[13]
White-box AES implementation, https://github.com/wbaes/wbaes
[14]
Certivox, Miracl library, https://www.certivox.com/miracle

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DroNet '16: Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use
June 2016
62 pages
ISBN:9781450344050
DOI:10.1145/2935620
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. drone delivery service
  2. security framework
  3. white-box cryptography

Qualifiers

  • Research-article

Funding Sources

  • The K-SCARF project the ICT R&D program of ETRI[Research on Key Leakage Analysis and Response Technologies]
  • National Re- search Foundation of Korea (NRF) grant funded by the Korea government (MSIP)

Conference

MobiSys'16
Sponsor:

Acceptance Rates

DroNet '16 Paper Acceptance Rate 6 of 15 submissions, 40%;
Overall Acceptance Rate 29 of 50 submissions, 58%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)8
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media