Evaluating Post-Quantum Key Exchange Mechanisms for UAV Communication Security

The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast...

Full description

Saved in:
Bibliographic Details
Published inIEEE/AIAA Digital Avionics Systems Conference pp. 1 - 10
Main Authors Aissaoui, Ridwane, Deneuville, Jean-Christophe, Guerber, Christophe, Pirovano, Alain
Format Conference Proceeding
LanguageEnglish
Published IEEE 29.09.2024
Subjects
Online AccessGet full text
ISSN2155-7209
DOI10.1109/DASC62030.2024.10749304

Cover

Abstract The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast communications, such as command and video information, is imperative to thwart tampering and impersonation. Encryption emerges as an optimal solution for safeguarding such data. Efficient utilization of symmetrical encryption mandates the imple-mentation of secure key exchange mechanisms. However, intro-ducingAuthenticated Key Exchange (AKE) standards on diminutive Unmanned Aerial Vehicles (UAVs) encounters problems due to hardware limitations. To surmount this challenge, lightweight cryptographic algorithms tailored for resource-constrained hard-ware have been developed. Nonetheless, both lightweight and conventional cryptographic algorithms are susceptible to quantum computing threats. In response, post-quantum cryptographic primitives are undergoing standardization. This study assesses post-quantumKey Encapsulation Mechanism (KEM) candidates, namely CRYSTALS-Kyber, Hamming Quasi-Cyclic (HQC), and BIKE, on hardware resembling small UAVs. The evaluation of these algorithms focuses on computation time, considering real-time tasks during flights. The findings affirm the viability of employing unmodified standards on resource-constrained hardware concurrently with other priority tasks. Furthermore, quantum-vulnerable standards are also investigated to compare their performance against their more secure counterparts. All three post-quantum KEM candidates demonstrate usability in this environment, with CRYSTALS-Kyber being recommended for its superior performance, even surpassing certain prevailing standards.
AbstractList The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast communications, such as command and video information, is imperative to thwart tampering and impersonation. Encryption emerges as an optimal solution for safeguarding such data. Efficient utilization of symmetrical encryption mandates the imple-mentation of secure key exchange mechanisms. However, intro-ducingAuthenticated Key Exchange (AKE) standards on diminutive Unmanned Aerial Vehicles (UAVs) encounters problems due to hardware limitations. To surmount this challenge, lightweight cryptographic algorithms tailored for resource-constrained hard-ware have been developed. Nonetheless, both lightweight and conventional cryptographic algorithms are susceptible to quantum computing threats. In response, post-quantum cryptographic primitives are undergoing standardization. This study assesses post-quantumKey Encapsulation Mechanism (KEM) candidates, namely CRYSTALS-Kyber, Hamming Quasi-Cyclic (HQC), and BIKE, on hardware resembling small UAVs. The evaluation of these algorithms focuses on computation time, considering real-time tasks during flights. The findings affirm the viability of employing unmodified standards on resource-constrained hardware concurrently with other priority tasks. Furthermore, quantum-vulnerable standards are also investigated to compare their performance against their more secure counterparts. All three post-quantum KEM candidates demonstrate usability in this environment, with CRYSTALS-Kyber being recommended for its superior performance, even surpassing certain prevailing standards.
Author Guerber, Christophe
Pirovano, Alain
Deneuville, Jean-Christophe
Aissaoui, Ridwane
Author_xml – sequence: 1
  givenname: Ridwane
  surname: Aissaoui
  fullname: Aissaoui, Ridwane
  email: ridwane.aissaoui@enac.fr
  organization: ENAC, University of Toulouse,France
– sequence: 2
  givenname: Jean-Christophe
  surname: Deneuville
  fullname: Deneuville, Jean-Christophe
  email: jean-christophe.deneuville@enac.fr
  organization: ENAC, University of Toulouse,France
– sequence: 3
  givenname: Christophe
  surname: Guerber
  fullname: Guerber, Christophe
  email: christophe.guerber@enac.fr
  organization: ENAC, University of Toulouse,France
– sequence: 4
  givenname: Alain
  surname: Pirovano
  fullname: Pirovano, Alain
  email: alain.pirovano@enac.fr
  organization: ENAC, University of Toulouse,France
BookMark eNo1kMtOwzAURA0CiVLyB0j4BxKu7evEXkYhPER5qZRt5SR2G9Q4KA9E_p4iYDWzOSOdOSVHvvWWkAsGEWOgL6_SZRZzEBBx4BgxSFALwAMS6EQrIUGgjhkckhlnUoYJB31Cgr5_BwAGSsYSZ-Qx_zS70Qy139Dnth_Cl9H4YWzovZ1o_lVujd9Y-mB_St03PXVtR1fpG83aphl9Xe7R1tOlLceuHqYzcuzMrrfBX87J6jp_zW7DxdPNXZYuwi1nMITolHRQlVXh0DnOEUsFQlgVx4k2WFVJwbESGDvnROWEVrKwUqIqEyX3amJOzn93a2vt-qOrG9NN6_8LxDcDQlJL
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/DASC62030.2024.10749304
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350349610
EISSN 2155-7209
EndPage 10
ExternalDocumentID 10749304
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-h210t-4f85f0dcdbf4ff2244c8033e86679a4dd7b24d346fff3df3985be5548c7858353
IEDL.DBID RIE
IngestDate Wed Mar 26 06:02:01 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-h210t-4f85f0dcdbf4ff2244c8033e86679a4dd7b24d346fff3df3985be5548c7858353
PageCount 10
ParticipantIDs ieee_primary_10749304
PublicationCentury 2000
PublicationDate 2024-Sept.-29
PublicationDateYYYYMMDD 2024-09-29
PublicationDate_xml – month: 09
  year: 2024
  text: 2024-Sept.-29
  day: 29
PublicationDecade 2020
PublicationTitle IEEE/AIAA Digital Avionics Systems Conference
PublicationTitleAbbrev DASC
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001085654
Score 1.9151995
Snippet The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Authentication
Autonomous aerial vehicles
Drone
Encapsulation
Encryption
Hardware
Information Security
Key Encapsulation Mechanism
Post-Quantum Cryptography
Quantum computing
Real-time systems
Safety
UAS
UAV
Unicast
Usability
UTM
Title Evaluating Post-Quantum Key Exchange Mechanisms for UAV Communication Security
URI https://ieeexplore.ieee.org/document/10749304
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA66J59UnPibPPjabk0uafI45sZQNpQ52dtom0RFtolrQf3rvbSdQ0HwLRRSwl3I3SXf9x0hlw4csyLGzQuRCsCZLFCaJQGAAWGiKElLxZvhSA4mcD0V05qsXnJhrLUl-MyGfli-5ZtlVvirspYHD2ru1T-3YyUrstbmQgWTBymgxnBFbd266oy7kuEuxjKQQbie_aOPShlG-rtktF5AhR55CYs8DbPPX9qM_17hHmluGHv09jsW7ZMtuzggo14t5b14pL4pb3BXoB2LOb2xH7T3XnF-6dD6wfNqvqKYwNJJ54H-YI3Qcd3irkkm_d59dxDU_ROCJyzkcrS8Eq5tMpOiRxzGashUm3OrpIx1AsbEKQPDQTrnuHFcK5FaTC9UFiuBmRk_JI3FcmGPCE2xDpNxYrQWCSiWKMbxYASHf8QSkqtj0vTGmL1WEhmztR1O_vh-Sna8Tzzwgukz0sjfCnuO0T1PL0qvfgFxGaNy
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA4yH_RJxYm_zYOv7dbm0qaPY25MtxVlm-xttE2iIuvEtaD-9V7azjFB8C0UUsJdyN0l3_cdIdcatKu4j5sXHGGBloklAjeyACRw6ThRXCjeDEOvN4G7KZ9WZPWCC6OUKsBnyjbD4i1fLpLcXJU1DHgwYEb9c5sDAC_pWusrFUwfPA4VistpBo2b1qjtubiPsRB0wV7N3-ikUgSS7h4JV0so8SOvdp7FdvL1S53x32vcJ_U1Z4_e_0SjA7Kl0kMSdiox7_SJmra81kOOlszntK8-aeejZP3SoTKDl-V8STGFpZPWI93gjdBR1eSuTibdzrjds6oOCtYzlnIZ2l5w3ZSJjNEnGqM1JKLJmBKe5wcRSOnHLkgGntaaSc0CwWOFCYZIfMExN2NHpJYuUnVMaIyVmOdHMgh4BMKNhMvwaASNf8QikokTUjfGmL2VIhmzlR1O__h-RXZ64-FgNrgN-2dk1_jHwDDc4JzUsvdcXWCsz-LLwsPfMbOmvw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE%2FAIAA+Digital+Avionics+Systems+Conference&rft.atitle=Evaluating+Post-Quantum+Key+Exchange+Mechanisms+for+UAV+Communication+Security&rft.au=Aissaoui%2C+Ridwane&rft.au=Deneuville%2C+Jean-Christophe&rft.au=Guerber%2C+Christophe&rft.au=Pirovano%2C+Alain&rft.date=2024-09-29&rft.pub=IEEE&rft.eissn=2155-7209&rft.spage=1&rft.epage=10&rft_id=info:doi/10.1109%2FDASC62030.2024.10749304&rft.externalDocID=10749304