UAS SECURITY: ENCRYPTION KEY NEGOTIATION FOR PARTITIONED DATA

被引:0
|
作者
Steinmann, Jessica A. [1 ]
Babiceanu, Radu F. [1 ]
Seker, Remzi [1 ]
机构
[1] Embry Riddle Aeronaut Univ, Dept Elect Comp Software & Syst Engn, Daytona Beach, FL 32114 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned aerial systems, often referred as drones, are becoming largely popular among general public and businesses. The system includes the actual unmanned aerial system (UAS), the ground station and the communication link between them. The data transmitted between the ground station and the UAS in both directions, as well as the data stored on the UAS memory chips in the case of a crash or an illegitimate access to it, should not be easily available to a third party. This paper proposes an encryption key negotiation method for partitioned data stored and exchanged in UAS applications. The proposed approach, aimed at providing authentication and security through key negotiation, includes a modified cryptographic protocol that uses a combination of off-the-record and pretty good privacy to encrypt the data stored on UAS and the data transmitted through the communication link between the ground station and the UAS. The encryption solutions were tested using a Java environment and are proposed to be implemented on FPGA development boards to be installed on prototype UAS. Depending on the encryption method used AES/RSA and the computational requirements, the cost of an actual implementation may increase due to the need of faster FPGA chips.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Partitioned Searchable Encryption
    Barthel, Jim
    Beunardeau, Marc
    Rosie, Razvan
    Sahu, Rajeev Anand
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 63 - 79
  • [22] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [23] Security Enhancement in Data Encryption Standard
    Verma, Jatin
    Prasad, Sunita
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT-THIRD INTERNATIONAL CONFERENCE, ICISTM 2009, 2009, 31 : 325 - 334
  • [24] Optical encryption techniques for data security
    Singh, K
    OPTICS FOR THE QUALITY OF LIFE, PTS 1 AND 2, 2003, 4829 : 419 - 420
  • [25] Combination of hiding and encryption for data security
    Aljazaery I.A.
    Alrikabi H.T.S.
    Aziz M.R.
    International Journal of Interactive Mobile Technologies, 2020, 14 (09) : 34 - 47
  • [26] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [27] Research on Network Security and Data Encryption
    Duan, Zhongqi
    Xue, Xiaofeng
    INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 531 - +
  • [28] The application of data encryption in network security
    Liu Changming
    Sun Yanjun
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 549 - 551
  • [29] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [30] Systematic Security Analysis of Stream Encryption With Key Erasure
    Chen, Yu Long
    Luykx, Atul
    Mennink, Bart
    Preneel, Bart
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (11) : 7518 - 7534