AUTHENTICATION OF WIRELESS SYSTEMS BASED ON A DRONE SWARM AS A COMPONENT OF THE 5G RADIO ACCESS NETWORK ARCHITECTURE

Authors

DOI:

https://doi.org/10.20535/2411-2976.12024.18-27

Keywords:

5G, NR 5G, security, authentication, group authentication, identification, drone, UAV, swarm of drones

Abstract

Background. When establishing security measures for telecommunication networks involving unmanned aerial vehicles (UAVs), characteristics such as high scalability, device diversity, and high mobility should be considered. Authentication is a fundamental property that allows a UAV network to establish secure communication between its core components. Authentication also protects the UAV network from attackers impersonating legitimate UAVs. UAV authentication can further secure the communication channel by preventing impersonation and replay attacks. The design of UAV access control schemes, such as authorization and authentication mechanisms, remains a challenging research problem in UAV networks. The network becomes even more complicated when it interacts with a multitude of UAVs, called a swarm. A swarm by its very nature has a dynamic structure, and this raises the issue of unreliable constraints on UAVs in its composition. A standardized solution for the authentication of a single drone using the new 5G radio network (NR) is known, but for a swarm of drones, this is an open field of research. Per-UAV authentication key sharing as described in 5G NR does not scale across groups of UAVs.

Objective. The purpose of this work is to conduct an analytical review and consider approaches to creating procedures for the authentication of a swarm of UAVs/drones with wireless equipment on board for the 5G NR network, taking into account the features of swarm formation and the very requirements for 5G authentication.

Methods. Analysis of factors affecting the quality of provision of telecommunication services using UAVs in fifth generation networks. Analysis of well-known publications dedicated to the implementation of 5G networks and the use of drones in them. Comparing the implementation of UAV authentication procedures with on-board wireless equipment in the 5G network.

Results. The widespread use of small UAVs, as well as the large expansion of wireless 5G networks, requires new security measures to prevent unauthorized access to sensitive data.

Identification and Authentication for a mobile operator's network using drones allows for secure communication between its main components. This makes it possible to recognize the very drones that participate in the formation of such a network. Drone authentication often protects the communication channel by preventing replay attacks. The development of drone radio access control mechanisms, such as authorization and authentication mechanisms, remain relevant researches for the construction of promising radio access networks involving UAVs.

It has been confirmed that the introduction of special group procedures for the authentication of a swarm of drones in the 5G network can significantly improve the quality of the provision of telecommunication services.

Conclusions. When working with a swarm of drones, in addition to the usual problems with encryption and authentication (within the swarm and for communication between the swarm and the ground control station), there are additional problems related to the constant change in the composition of the swarm and its hovering position: drones can join or leave a swarm.

Depending on the swarm management structure, a different method of authentication will be needed, which makes it difficult to unify such procedures for a swarm of drones. Authentication procedures for a swarm of drones in 5G can be implemented through the following approaches: individual authentication, when each drone as a member of the swarm undergoes authentication with one NR 5G ground station; you can consider such an approach as authentication of a group of IoT devices, if the traffic of the swarm is very limited; group authentication through a leader drone that communicates with swarm members and the 5G operator's network; group distributed authentication through edge drones.

Group authentication via a drone leader is presented, where authentication is performed through a mechanism based on distributed delegation to reduce the service traffic directed to the 5G operator's core network. Here, legitimate drones are authorized as proxy delegated signers to perform authentication on behalf of the underlying network.

Group distributed authentication through boundary drones is considered, which offers more solutions than the case of authentication through a leader drone. Here, a solution is possible for several cases at once, for example, authentication of new drones (entering the swarm or leaving the swarm) and merging two separate drone swarms.

References

M. A. Khan, N. Kumar, S. A. H. Mohsan, W. U. Khan, M. M. Nasralla, M. H. Alsharif, J. Zywiołek, I. Ullah, “Swarm of UAVs for Network Management in 6G: A Technical Review”, IEEE Transactions on Network and Service Management, 20 (1), рp. 741-761 (2023), http://dx.doi.org/10.1109/TNSM.2022.3213370.

S. Ahmadi, 5G NR: Architecture, Technology, Implementation, and Operation of 3GPP New Radio Standards. - London: Academic Press, 2019. – 1020 р.

B. Li, Z. Fei, Y. Zhang, “UAV Communications for 5G and Beyond: Recent Advances and Future Trends”, IEEE Internet of Things Journal, Vol. 6, Issue 2, рр. 2241 – 2263. (2019), https://doi.org/10.1109/JIOT.2018.2887086.

M. Ilchenko, S. Kravchuk, “Mobile infocommunication systems”, Information and Telecommunication Sciences, Vol. 11, Number 1, рр. 11-19 (2020), https://doi.org/10.20535/2411-2976.12020.11-19.

S. O. Kravchuk, Theory of mobile information communication systems. System architecture [Electronic resource] / S. O. Kravchuk. – Electronic text data (1 file: 18.17 MB). – Kyiv: Igor Sikorsky KPI, 2023. – 683 р. Retrieved from https://ela.kpi.ua/handle/123456789/53198.

3GPP TS 29.255 V18.2.0 (2023-12). Technical Specification. 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 5G System; Uncrewed Aerial System Service Supplier (USS) Services; Stage 3 (Release 18), 29 р., https://portal.3gpp.org.

3GPP TS 29.256 V18.3.0 (2023-12). Technical Specification. 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 5G System; Uncrewed Aerial Systems Network Function (UAS-NF); Aerial Management Services; Stage 3 (Release 18), 28 р., https://portal.3gpp.org.

M. M. Kaidenko, S. O. Kravchuk, “Anti-Jamming System for Small Unmanned Aerial Vehicles”, 2021 IEEE 6th International Conference on Actual Problems of Unmanned Aerial Vehicles Development (APUAVD), 19-21 Oct. 2021, Kyiv, Ukraine, pp. 1-4, DOI: 10.1109/APUAVD53804.2021.9615403, Date Added to IEEE Xplore: 26 November 2021.

M. Kaidenko, S. Kravchuk, “Protection against the effect of different classes of attacks on UAV control channels”, Information and Telecommunication Sciences, No. 1 (2022), рp. 35-43, DOI: https://doi.org/10.20535/2411-2976.12022.35-43.

S. Kravchuk, I. Kravchuk, “Wireless Connection of Drones to the Base Station of the Existing Terrestrial Mobile Network”, in: Ilchenko, M., Uryvsky, L., Globa, L. (eds) Progress in Advanced Information and Communication Technology and Systems. MCiT 2021. Lecture Notes in Networks and Systems, vol 548. Springer, Cham. (ISSN2367-3370, E-ISSN2367-3389, ISBN 978-3-031-16367-8) – pp. 377–397 (2023), https://doi.org/10.1007/978-3-031-16368-5_19.

S. Kravchuk, L. Afanasieva, “Three-Dimensional Model of the Radio Links Formation between the Base Station Antenna and the User Terminal with Retransmission through the Unmanned Aerial Vehicle”, 2021 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), 29 Nov.-3 Dec. 2021, Odesa, Ukraine, pp. 93-96, https://doi.org/10.1109/UkrMiCo52950.2021.9716589 (https://ieeexplore.ieee.org/abstract/document/9716589).

UAV Networks and Communications, Edited by K. Namuduri, S. Chaumette, J. H. Kim, J. P. G. Sterbenz, Cambridge University Press, 2018, ISBN 978-1-107-11530-9.

3GPP TS 22.125 V19.1.0 (2023-12). Technical Specification. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Uncrewed Aerial System (UAS) support in 3GPP; Stage 1 (Release 19), 17 р., https://portal.3gpp.org.

3GPP TS 29.257 V18.3.0 (2024-03). Technical Specification. 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Application layer support for Uncrewed Aerial System (UAS); UAS Application Enabler (UAE) Server Services; Stage 3 (Release 18), 158 р., https://portal.3gpp.org.

3GPP TR 38.889 V16.0.0 (2018-12). Technical Report. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Study on NR-based access to unlicensed spectrum (Release 16), 119 р., https://portal.3gpp.org.

ETSI TR 138 912 V14.1.0 (2017-10). 3GPP TR 38.912 version 14.1.0 (Release 14). 5G; Study on new radio access technology. 77 р., http://www.etsi.org/standards-search.

3GPP TR 38.811 V15.4.0 (2020-09). Technical Report. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Study on New Radio (NR) to support non-terrestrial networks (Release 15), 127 р., https://portal.3gpp.org.

ETSI TS 123 256 V17.3.0 (2022-07) 5G; Support of Unscrewed Aerial Systems (UAS) connectivity, identification and tracking; Stage 2 (3GPP TS 23.256 version 17.3.0 Release 17), http://www.etsi.org/standards-search.

S.O. Kravchuk, “Drone ID open architecture and remote drone identification protocol”, Proceedings of the International Scientific Conference "Moden Challenges in Telecommunications", April 18-21, 2023, Kyiv, Ukraine, рp. 189–191 (2023). Retrieved from http://conferenc.its.kpi.ua/proc/article/view/281720.

L. Chaponniere, “TSG CT work on UAS Connectivity, Identification and Tracking, 3GPP Technologies” (2022), https://www.3gpp.org/technologies/tsg-ct-work-on-uas-connectivity-identification-and-tracking.

Y. Aydin, G. K. Kurt, E. Ozdemir, H. Yanikomeroglu, “Group Authentication for Drone Swarms”, 2021 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), Cleveland, OH, USA, 12-14 October (2021) рp. 72-77. https://doi.org/10.1109/WiSEE50203.2021.9613831.

3GPP TR 33.854 V17.1.0 (2021-12). Technical Report. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on security aspects of Uncrewed Aerial Systems (UAS) (Release 17). 62 p., https://www.3gpp.org.

Y. Aydin, G. K. Kurt, E. Ozdemir, H. Yanikomeroglu, “Authentication and Handover Challenges and Methods for Drone Swarms”, IEEE Journal of Radio Frequency Identification, Vol. 6, pp. 220 - 228 (2022), https://doi.org/10.1109/JRFID.2022.3158392.

X. Chen, J. Tang, S. Lao, “Review of Unmanned Aerial Vehicle Swarm Communication Architectures and Routing Protocols”, Appl. Sci. 10, 3661 (2020), doi:10.3390/app10103661.

T. Zeng, M. Mozaffari, O. Semiari, W. Saad, M. Bennis, M. Debbah, “Wireless Communications and Control for Swarms of Cellular-Connected UAVs”, 52nd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, (2018), pp. 719-723. doi: 10.1109/ACSSC.2018.8645472

S. Kravchuk, L. Afanasieva, “Formation of a wireless communication system based on a swarm of unmanned aerial vehicles”, Information and Telecommunication Sciences, No 1, pp.11-18 (2019), DOI: https://doi.org/10.20535/2411-2976.12019.11-18

S.O. Kravchuk, I.M. Kravchuk, “Using RFID technology at operating a drone swarms in communication system mode”, Information and Telecommunication Sciences, Vol. 11, N. 2 (21), pp. 16-23 (2020), https://doi.org/10.20535/2411-2976.22020.16-23.

UAV Networks and Communications, Edited by K. Namuduri, S. Chaumette, J. H. Kim, J.P.G. Sterbenz, Cambridge University Press, 2018, ISBN 978-1-107-11530-9

Z. Liu, X. Yu, C. Yuan, Y. Zhang, “Leader-follower formation control of unmanned aerial vehicles with fault tolerant and collision avoidance capabilities,” 2015 International Conference on Unmanned Aircraft Systems (ICUAS) 09-12 June (2015), https://doi.org/10.1109/ICUAS.2015.7152392

M. A. Abdel-Malek, K. Akkaya, A. Bhuyan, A. S. Ibrahim, “A Proxy Signature-Based Swarm Drone Authentication with Leader Selection in 5G Networks”, IEEE Access, Vol, 10, pp. 57485-57498 (2022). DOI: 10.1109/ACCESS.2022.3178121

M. Wifvesson, P. K. Nakarmi, 5G Release 17: Overview of new RAN security features, Ericsson Blog (2022), https://www.ericsson.com/en/blog/2022/10/3gpp-release-17-security-ran

B. Lee, H. Kim, K. Kim,‘‘Strong proxy signature and its applications’’, in Proc. SCIS 2001, The 2001 Symposium on Cryptography and Information Security, Oiso, Japan, January 23-26, 2001 The Institute of Electronics, Information and Communication Engineers, pp. 603–608 (2001).

Downloads

Published

2024-06-28

Issue

Section

Статті