Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach

Mattia Piana,Francesco Ardizzon,Stefano Tomasin
2024-10-01
Abstract:In this paper, we propose a novel strategy for physical layer authentications based on the challenge-response concept for a transmitting drone (Alice). In a preliminary training phase, Alice moves over several positions, and Bob (either a drone or a ground device) estimates the Alice-Bob channel gains. Then Alice transmits its message from different random positions (challenge) and Bob, upon receiving the messages, authenticates the sender via a log-likelihood test on the estimated channel gains (response). In turn, the intruder Trudy selects random positions on which she transmits messages on behalf of Alice to Bob. In this paper, we design the probability mass distribution of Alice's challenge positions and the Trudy response positions by modeling the problem as a zero-sum game between Bob and Trudy, where the payoff of Trudy is the missed detection probability. Moreover, we propose three different approaches that minimize the energy spent by Alice without sacrificing security, which differ in computational complexity and resulting energy consumption. Finally, we test the proposed technique via numerical simulations, which include a realistic model of both Alice-Bob and Trudy-Bob fading channels, affected by shadowing.
Signal Processing
What problem does this paper attempt to address?
This paper attempts to solve the problem of message authentication in UAV (Unmanned Aerial Vehicle) communications. Specifically: 1. **Background and Problems**: - With the wide application of UAVs in military and civilian fields, the security of their communications has become an increasingly important issue. In particular, for the jamming or spoofing signal transmissions targeting UAV navigation systems, these threats may disrupt the UAV's missions. - Traditional encryption - based message authentication methods have problems such as high computational complexity, large communication overhead, and the possibility of being broken by quantum computing. These problems are more prominent especially on resource - limited UAV platforms. 2. **Research Objectives**: - Propose a challenge - response mechanism based on Physical - Layer Authentication (PLA) to ensure that the messages sent by the UAV (Alice) can be accurately verified by the receiver (Bob, which can be a ground device or another UAV), preventing malicious UAVs (Trudy) from impersonating Alice to send false messages. - Design an optimized location distribution strategy, minimizing the Miss - Detection probability (MD) by modeling it as a zero - sum game, while taking into account practical factors such as channel fading and shadowing effects. - Propose three different energy - minimization strategies to reduce Alice's energy consumption while ensuring security. 3. **Main Contributions**: - Establish a UAV - to - receiver channel model, including the channel estimation phase and the actual security protocol design. - Design the probability distributions of Bob and Trudy's location selections through a zero - sum game model, where the payoff function is the Miss - Detection probability (MD) under a given False - Alarm probability (FA). - Propose optimal and low - complexity solutions to optimize the statistical distribution of Bob's location selection. - Verify the effectiveness of the proposed techniques through numerical simulations, using a real - channel model that includes shadowing effects. 4. **Specific Implementations**: - In the initial training phase, Bob measures the channel gains of Alice at multiple predefined locations. - In the authentication transmission protocol, Bob randomly selects a set of locations and secretly informs Alice. Alice sends pilot signals and messages to be authenticated from these locations. - Bob verifies the authenticity of the messages by checking whether the channel gains corresponding to the received signals are consistent with the expected ones. - Trudy attempts to deceive Bob by randomly selecting locations to send signals, and the probability distributions of Bob and Trudy's location selections are optimized by finding the Nash Equilibrium (NE) of the zero - sum game. In conclusion, this paper aims to improve the security of UAV communications through the physical - layer authentication mechanism, while reducing energy consumption and ensuring efficient and secure message authentication on resource - constrained UAV platforms.