%0 Conference Proceedings %T A Secure and Trusted Channel Protocol for UAVs Fleets %+ Royal Holloway [University of London] (RHUL) %+ XLIM (XLIM) %+ Laboratoire de Recherche en Informatique (LARI) %+ Mathématiques & Sécurité de l'information (XLIM-MATHIS) %+ Laboratoire de Recherche en Informatique [ESI-SBA, Sidi Bel Abbès] (LabRI-SBA) %+ Laboratoire Bordelais de Recherche en Informatique (LaBRI) %A Akram, Raja, Naeem %A Markantonakis, Konstantinos %A Mayes, Keith %A Bonnefoi, Pierre-François %A Cherif, Amina %A Sauveron, Damien %A Chaumette, Serge %Z Part 1: Security in Emerging Systems %< avec comité de lecture %( Lecture Notes in Computer Science %B 11th IFIP International Conference on Information Security Theory and Practice (WISTP) %C Heraklion, Greece %Y Gerhard P. Hancke %Y Ernesto Damiani %I Springer International Publishing %3 Information Security Theory and Practice %V LNCS-10741 %P 3-24 %8 2017-09-28 %D 2017 %R 10.1007/978-3-319-93524-9_1 %Z Computer Science [cs]Conference papers %X Fleets of UAVs will be deployed in near future in reliability and safety critical applications (e.g. for smart cities). To satisfy the stringent level of criticality, each UAV in the fleet must trust the other UAVs with which it communicates to get assurance of the trustworthiness in information received and to be sure not to disclose information to an unauthorized party. In addition, to be protected against an attacker willing to eavesdrop and/or modify the exchanged data, the communication channel needs to be secured, i.e. it has to provide confidentiality and integrity of exchanges. The work presented here is based on our previous research which concluded that it is required that each UAV includes a Secure Element (which we called ARFSSD standing for Active Radio Frequency Smart Secure Device) to withstand an adversary with a high attack potential. In this paper, we propose a secure and trusted channel protocol that satisfies the stated security and operational requirements for a UAV-to-UAV communication protocol. This protocol supports three main objectives: (1) it provides the assurance that all communicating entities can trust each other and can trust their internal (secure) software and hardware states; (2) it establishes a fair key exchange process between all communicating entities so as to provide a secure channel; (3) it is efficient for both the initial start-up of the network and when resuming a session after a cold and/or warm restart of a UAV. The proposed protocol is formally verified using CasperFDR and AVISPA. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01875525/document %2 https://inria.hal.science/hal-01875525/file/469589_1_En_1_Chapter.pdf %L hal-01875525 %U https://inria.hal.science/hal-01875525 %~ UNILIM %~ CNRS %~ XLIM %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ XLIM-MATHIS %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-10741 %~ TEST-HALCNRS