UAS SECURITY: ENCRYPTION KEY NEGOTIATION FOR PARTITIONED DATA

被引:0
|
作者
Steinmann, Jessica A. [1 ]
Babiceanu, Radu F. [1 ]
Seker, Remzi [1 ]
机构
[1] Embry Riddle Aeronaut Univ, Dept Elect Comp Software & Syst Engn, Daytona Beach, FL 32114 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned aerial systems, often referred as drones, are becoming largely popular among general public and businesses. The system includes the actual unmanned aerial system (UAS), the ground station and the communication link between them. The data transmitted between the ground station and the UAS in both directions, as well as the data stored on the UAS memory chips in the case of a crash or an illegitimate access to it, should not be easily available to a third party. This paper proposes an encryption key negotiation method for partitioned data stored and exchanged in UAS applications. The proposed approach, aimed at providing authentication and security through key negotiation, includes a modified cryptographic protocol that uses a combination of off-the-record and pretty good privacy to encrypt the data stored on UAS and the data transmitted through the communication link between the ground station and the UAS. The encryption solutions were tested using a Java environment and are proposed to be implemented on FPGA development boards to be installed on prototype UAS. Depending on the encryption method used AES/RSA and the computational requirements, the cost of an actual implementation may increase due to the need of faster FPGA chips.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Secure data encryption key scenario for protecting private data security and privacy
    Mandal, Sanjeev Kumar
    Sharma, Amit
    Henge, Santosh Kumar
    Bashir, Sumaira
    Shukla, Madhuresh
    Pathak, Asim Tara
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 269 - 281
  • [2] Enhanced Cloud Security Framework To Confirm Data Security on Asymmetric And Symmetric Key Encryption
    Jayapandian, N.
    Rahman, A. M. J. Md. Zubair
    Radhikadevi, S.
    Koushikaa, M.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [3] Key-Based Enhancement of Data Encryption Standard For Text Security
    Reyad, Omar
    Mansour, Hanaa M.
    Heshmat, Mohamed
    Zanaty, Elnomery A.
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1209 - +
  • [4] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629
  • [5] On Unconditional ε-Security of Private Key Encryption
    Jiang, Shaoquan
    COMPUTER JOURNAL, 2014, 57 (10): : 1570 - 1579
  • [7] Novel quantum key distribution and attribute based encryption for cloud data security
    Verma, Garima
    Kumar, Ashutosh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [8] Data Security On RFID Information Using Word Auto Key Encryption Algorithm
    Rahim, Robbi
    Lubis, Syamsuddin
    Nurmalini, N.
    Dafitri, Haida
    1ST INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED SCIENCE, 2019, 1381
  • [9] Iot Data Security Authentication and Key Negotiation Scheme Based on Edge Computing and Blockchain
    Wang, Sheng
    Zhou, Xiangzhen
    Journal of Network Intelligence, 2023, 8 (02): : 364 - 380
  • [10] Encryption is not a panacea for data security
    Koehler, Jochen
    NTZ Informations und Kommunikationstechnik, 2011, 64 (05): : 44 - 45