Evaluating Post-Quantum Key Exchange Mechanisms for UAV Communication Security
The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast...
Saved in:
| Published in | IEEE/AIAA Digital Avionics Systems Conference pp. 1 - 10 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
29.09.2024
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2155-7209 |
| DOI | 10.1109/DASC62030.2024.10749304 |
Cover
| Abstract | The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast communications, such as command and video information, is imperative to thwart tampering and impersonation. Encryption emerges as an optimal solution for safeguarding such data. Efficient utilization of symmetrical encryption mandates the imple-mentation of secure key exchange mechanisms. However, intro-ducingAuthenticated Key Exchange (AKE) standards on diminutive Unmanned Aerial Vehicles (UAVs) encounters problems due to hardware limitations. To surmount this challenge, lightweight cryptographic algorithms tailored for resource-constrained hard-ware have been developed. Nonetheless, both lightweight and conventional cryptographic algorithms are susceptible to quantum computing threats. In response, post-quantum cryptographic primitives are undergoing standardization. This study assesses post-quantumKey Encapsulation Mechanism (KEM) candidates, namely CRYSTALS-Kyber, Hamming Quasi-Cyclic (HQC), and BIKE, on hardware resembling small UAVs. The evaluation of these algorithms focuses on computation time, considering real-time tasks during flights. The findings affirm the viability of employing unmodified standards on resource-constrained hardware concurrently with other priority tasks. Furthermore, quantum-vulnerable standards are also investigated to compare their performance against their more secure counterparts. All three post-quantum KEM candidates demonstrate usability in this environment, with CRYSTALS-Kyber being recommended for its superior performance, even surpassing certain prevailing standards. |
|---|---|
| AbstractList | The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security in communications plays a pivotal role in ensuring the operational safety of the UTM. Maintaining the integrity and authentication of unicast communications, such as command and video information, is imperative to thwart tampering and impersonation. Encryption emerges as an optimal solution for safeguarding such data. Efficient utilization of symmetrical encryption mandates the imple-mentation of secure key exchange mechanisms. However, intro-ducingAuthenticated Key Exchange (AKE) standards on diminutive Unmanned Aerial Vehicles (UAVs) encounters problems due to hardware limitations. To surmount this challenge, lightweight cryptographic algorithms tailored for resource-constrained hard-ware have been developed. Nonetheless, both lightweight and conventional cryptographic algorithms are susceptible to quantum computing threats. In response, post-quantum cryptographic primitives are undergoing standardization. This study assesses post-quantumKey Encapsulation Mechanism (KEM) candidates, namely CRYSTALS-Kyber, Hamming Quasi-Cyclic (HQC), and BIKE, on hardware resembling small UAVs. The evaluation of these algorithms focuses on computation time, considering real-time tasks during flights. The findings affirm the viability of employing unmodified standards on resource-constrained hardware concurrently with other priority tasks. Furthermore, quantum-vulnerable standards are also investigated to compare their performance against their more secure counterparts. All three post-quantum KEM candidates demonstrate usability in this environment, with CRYSTALS-Kyber being recommended for its superior performance, even surpassing certain prevailing standards. |
| Author | Guerber, Christophe Pirovano, Alain Deneuville, Jean-Christophe Aissaoui, Ridwane |
| Author_xml | – sequence: 1 givenname: Ridwane surname: Aissaoui fullname: Aissaoui, Ridwane email: ridwane.aissaoui@enac.fr organization: ENAC, University of Toulouse,France – sequence: 2 givenname: Jean-Christophe surname: Deneuville fullname: Deneuville, Jean-Christophe email: jean-christophe.deneuville@enac.fr organization: ENAC, University of Toulouse,France – sequence: 3 givenname: Christophe surname: Guerber fullname: Guerber, Christophe email: christophe.guerber@enac.fr organization: ENAC, University of Toulouse,France – sequence: 4 givenname: Alain surname: Pirovano fullname: Pirovano, Alain email: alain.pirovano@enac.fr organization: ENAC, University of Toulouse,France |
| BookMark | eNo1kMtOwzAURA0CiVLyB0j4BxKu7evEXkYhPER5qZRt5SR2G9Q4KA9E_p4iYDWzOSOdOSVHvvWWkAsGEWOgL6_SZRZzEBBx4BgxSFALwAMS6EQrIUGgjhkckhlnUoYJB31Cgr5_BwAGSsYSZ-Qx_zS70Qy139Dnth_Cl9H4YWzovZ1o_lVujd9Y-mB_St03PXVtR1fpG83aphl9Xe7R1tOlLceuHqYzcuzMrrfBX87J6jp_zW7DxdPNXZYuwi1nMITolHRQlVXh0DnOEUsFQlgVx4k2WFVJwbESGDvnROWEVrKwUqIqEyX3amJOzn93a2vt-qOrG9NN6_8LxDcDQlJL |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/DASC62030.2024.10749304 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350349610 |
| EISSN | 2155-7209 |
| EndPage | 10 |
| ExternalDocumentID | 10749304 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
| ID | FETCH-LOGICAL-h210t-4f85f0dcdbf4ff2244c8033e86679a4dd7b24d346fff3df3985be5548c7858353 |
| IEDL.DBID | RIE |
| IngestDate | Wed Mar 26 06:02:01 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-h210t-4f85f0dcdbf4ff2244c8033e86679a4dd7b24d346fff3df3985be5548c7858353 |
| PageCount | 10 |
| ParticipantIDs | ieee_primary_10749304 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-Sept.-29 |
| PublicationDateYYYYMMDD | 2024-09-29 |
| PublicationDate_xml | – month: 09 year: 2024 text: 2024-Sept.-29 day: 29 |
| PublicationDecade | 2020 |
| PublicationTitle | IEEE/AIAA Digital Avionics Systems Conference |
| PublicationTitleAbbrev | DASC |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001085654 |
| Score | 1.9151995 |
| Snippet | The seamless integration of Unmanned Aerial Systems (UAS) into public airspace necessitates a robust UAV Traffic Management (UTM) system. Information security... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Authentication Autonomous aerial vehicles Drone Encapsulation Encryption Hardware Information Security Key Encapsulation Mechanism Post-Quantum Cryptography Quantum computing Real-time systems Safety UAS UAV Unicast Usability UTM |
| Title | Evaluating Post-Quantum Key Exchange Mechanisms for UAV Communication Security |
| URI | https://ieeexplore.ieee.org/document/10749304 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA66J59UnPibPPjabk0uafI45sZQNpQ52dtom0RFtolrQf3rvbSdQ0HwLRRSwl3I3SXf9x0hlw4csyLGzQuRCsCZLFCaJQGAAWGiKElLxZvhSA4mcD0V05qsXnJhrLUl-MyGfli-5ZtlVvirspYHD2ru1T-3YyUrstbmQgWTBymgxnBFbd266oy7kuEuxjKQQbie_aOPShlG-rtktF5AhR55CYs8DbPPX9qM_17hHmluGHv09jsW7ZMtuzggo14t5b14pL4pb3BXoB2LOb2xH7T3XnF-6dD6wfNqvqKYwNJJ54H-YI3Qcd3irkkm_d59dxDU_ROCJyzkcrS8Eq5tMpOiRxzGashUm3OrpIx1AsbEKQPDQTrnuHFcK5FaTC9UFiuBmRk_JI3FcmGPCE2xDpNxYrQWCSiWKMbxYASHf8QSkqtj0vTGmL1WEhmztR1O_vh-Sna8Tzzwgukz0sjfCnuO0T1PL0qvfgFxGaNy |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA4yH_RJxYm_zYOv7dbm0qaPY25MtxVlm-xttE2iIuvEtaD-9V7azjFB8C0UUsJdyN0l3_cdIdcatKu4j5sXHGGBloklAjeyACRw6ThRXCjeDEOvN4G7KZ9WZPWCC6OUKsBnyjbD4i1fLpLcXJU1DHgwYEb9c5sDAC_pWusrFUwfPA4VistpBo2b1qjtubiPsRB0wV7N3-ikUgSS7h4JV0so8SOvdp7FdvL1S53x32vcJ_U1Z4_e_0SjA7Kl0kMSdiox7_SJmra81kOOlszntK8-aeejZP3SoTKDl-V8STGFpZPWI93gjdBR1eSuTibdzrjds6oOCtYzlnIZ2l5w3ZSJjNEnGqM1JKLJmBKe5wcRSOnHLkgGntaaSc0CwWOFCYZIfMExN2NHpJYuUnVMaIyVmOdHMgh4BMKNhMvwaASNf8QikokTUjfGmL2VIhmzlR1O__h-RXZ64-FgNrgN-2dk1_jHwDDc4JzUsvdcXWCsz-LLwsPfMbOmvw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE%2FAIAA+Digital+Avionics+Systems+Conference&rft.atitle=Evaluating+Post-Quantum+Key+Exchange+Mechanisms+for+UAV+Communication+Security&rft.au=Aissaoui%2C+Ridwane&rft.au=Deneuville%2C+Jean-Christophe&rft.au=Guerber%2C+Christophe&rft.au=Pirovano%2C+Alain&rft.date=2024-09-29&rft.pub=IEEE&rft.eissn=2155-7209&rft.spage=1&rft.epage=10&rft_id=info:doi/10.1109%2FDASC62030.2024.10749304&rft.externalDocID=10749304 |