UAS SECURITY: ENCRYPTION KEY NEGOTIATION FOR PARTITIONED DATA

被引:0
|
作者
Steinmann, Jessica A. [1 ]
Babiceanu, Radu F. [1 ]
Seker, Remzi [1 ]
机构
[1] Embry Riddle Aeronaut Univ, Dept Elect Comp Software & Syst Engn, Daytona Beach, FL 32114 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned aerial systems, often referred as drones, are becoming largely popular among general public and businesses. The system includes the actual unmanned aerial system (UAS), the ground station and the communication link between them. The data transmitted between the ground station and the UAS in both directions, as well as the data stored on the UAS memory chips in the case of a crash or an illegitimate access to it, should not be easily available to a third party. This paper proposes an encryption key negotiation method for partitioned data stored and exchanged in UAS applications. The proposed approach, aimed at providing authentication and security through key negotiation, includes a modified cryptographic protocol that uses a combination of off-the-record and pretty good privacy to encrypt the data stored on UAS and the data transmitted through the communication link between the ground station and the UAS. The encryption solutions were tested using a Java environment and are proposed to be implemented on FPGA development boards to be installed on prototype UAS. Depending on the encryption method used AES/RSA and the computational requirements, the cost of an actual implementation may increase due to the need of faster FPGA chips.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] The Bronze Key: Performing Data Encryption
    Kozel, Susan
    Gibson, Ruth
    Martelli, Bruno
    PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON TANGIBLE, EMBEDDED, AND EMBODIED INTERACTION (TEI'18), 2018, : 549 - 554
  • [42] Implicit Key-Stretching Security of Encryption Schemes
    Bossert, Jannis
    List, Eik
    Lucks, Stefan
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 17 - 40
  • [43] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [44] Deciding the Security of Protocols with Commuting Public Key Encryption
    Chevalier, Yannick
    Kuesters, Ralf K.
    Rusinowitch, Michael
    Turuani, Mathieu
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 55 - 66
  • [45] Data protection - Security: Data security - The key to privacy
    Carey, Peter
    Berry, David
    Computer Law and Security Report, 2002, 18 (02): : 112 - 113
  • [46] Multimedia data encryption via random rotation in partitioned bit streams
    Xie, DH
    Kuo, CCJ
    2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 5533 - 5536
  • [47] Security enhanced optical encryption system by random phase key and permutation key
    He, Mingzhao
    Tan, Qiaofeng
    Cao, Liangcai
    He, Qingsheng
    Jin, Guofan
    OPTICS EXPRESS, 2009, 17 (25): : 22462 - 22473
  • [48] Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data
    Mehrotra, Sharad
    Sharma, Shantanu
    Ullman, Jeffrey D.
    Mishra, Anurag
    2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 650 - 661
  • [49] Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach
    Shi, Junbin
    Yu, Yong
    Yu, Qiming
    Li, Huilin
    Wang, Lianhai
    IEEE NETWORK, 2022, 36 (04): : 166 - 173
  • [50] Hybrid Cryptography WAKE (Word Auto Key Encryption) and Binary Caesar Cipher Method For Data Security
    Sinaga, Mikha Dayan
    Sembiring, Nita Sari Br
    Tambunan, Frinto
    Sianturi, Charles Jhony Mantho
    2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM), 2018, : 253 - 257