Open Access Open Access  Restricted Access Subscription or Fee Access

High-Speed Video Data Encryption on LTE-Based Swarm UAS

Young-Joon Kim(1), Seung-Yeop Lee(2), Tae-Kyou Park(3*)

(1) Department of Aviation Management, Korea Aerospace University, Korea, Republic of
(2) HogreenAir Co., Ltd, Korea, Republic of
(3) Dept of Aerospace Software Engineering, Hanseo University, Korea, Republic of
(*) Corresponding author


DOI: https://doi.org/10.15866/irease.v11i5.15180

Abstract


This paper proposes a hybrid crypto-system that encrypts image data between swarm Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS) at a high speed on Long-Term Evolution (LTE)-based control system capable of long-distance communication. This swarm control system consists of environment that can control 10 UAVs through one GCS, and the crypto-system for image data consists of Elliptic Curve Cryptography (ECC) public-key algorithm and Light-weight Encryption Algorithm (LEA) symmetric-key algorithm. ECC is faster than Rivest Shamir Adleman (RSA) public-key algorithm and has the same security strength as the RSA, and LEA is a domestic standard symmetric key algorithm faster than Advanced Encryption Standard (AES). This paper implemented the image processing through OpenCV and Socket programs in the swarm flight system applying LTE communication, showing an efficient real-time image data encryption technique by applying the hybrid crypto-system using OpenSSL for the previously mentioned image processing.
Copyright © 2018 Praise Worthy Prize - All rights reserved.

Keywords


Elliptic Curve Cryptography (ECC); Hybrid Crypto-system; Light-weight Encryption Algorithm (LEA); Swarm Unmanned Aerial Vehicles (UAVs); Video Data Encryption

Full Text:

PDF


References


Kim Hartmann and Christoph Steup, The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment, Proc. of 5th International Conference on Cyber Conflict (2013).

Alan Kim, Brandon Wampler, James Goppert, and Inseok Hwang, Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles, Proc. of AIAA 2012 (June 2012).
http://dx.doi.org/10.2514/6.2012-2438

SkySoftware, SkyGrabber, Feb. 2018.

Emy Rivera, Robert Baykov and Guofei Gu, A Study On Unmanned Vehicles and Cyber Security, 2014.

Carolyn Boettcher et al., The MILS Component Integration Approach to Secure Information Sharing, the 27th IEEE/AIAA Digital Avionics Systems Conference (DASC) (Oct. 2008).
http://dx.doi.org/10.1109/dasc.2008.4702758

Xingqin Lin et al., The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles, Ericsson, 2017.
http://dx.doi.org/10.1109/mcom.2018.1700643

Qualcomm Technologies, LTE Unmanned Aircraft Systems, Trial Report v1.0.1, Qualcomm Technologies, Inc., May 2017.

Mahir Dursun and İsmet Çuhadar, Secure Video Streaming Implementation for Unmanned Air Vehicle (UAV) Data Link with Raspberry Pi 3 over https, International Journal of Informatics Technologies (2018).
http://dx.doi.org/10.17671/gazibtd.307294

Chen Xiao et al, A resource-efficient Multimedia encryption scheme for embedded video sensing system based on unmanned aircraft, Journal of Network and Computer Applications, Volume 59 (Jan. 2016), 117-125.
http://dx.doi.org/10.1016/j.jnca.2015.06.021

Ashutosh Singandhupe et al, Securing a UAV Using Individual Characteristics From an EEG Signal, Systems, 2017 IEEE International Conference on Man and Cybernetics (SMC), 2748-2753 (2017).
http://dx.doi.org/10.1109/smc.2017.8123042

Joppe W. et al., Elliptic Curve Cryptography in Practice, Conference on Financial, Springer (2014).
http://dx.doi.org/10.1007/978-3-662-45472-5_11

Deukjo Hong el al., LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors, Proc. of WISA 2013, LNCS, vol. 8269 (2014).
http://dx.doi.org/10.1007/978-3-319-05149-9_1

L. Weng, Q. Liu, M. Xia, and Y. D. Song, Immune network-based swarm intelligence and its application to unmanned aerial vehicle (UAV) swarm coordination, Neurocomputing, No. 0 (2013)
http://dx.doi.org/10.1016/j.neucom.2012.06.053

MAVLink Micro Air Vehicle Communication Protocol, http://qgroundcontrol.com, Feb. 2018.

Emilia Käsper, Fast Elliptic Curve Cryptography in OpenSSL, International Conference on Financial Cryptography and Data Security, Springer LNCS 7126 (2011).
http://dx.doi.org/10.1007/978-3-642-29889-9_4

Dindayal Mahto and Dilip Kumar Yadav, RSA and ECC: A Comparative Analysis, International Journal of Applied Engineering Research ISSN 0973-4562 Vol. 12, No. 19, Research India Publications (2017), 9053-9061.

Ajay Kumar et al., Symantec White Paper: Elliptic Curve Cryptography (ECC) Certificates Performance Analysis, May 2013.

Pericle Perazzo, Security in Networked Computer Systems OpenSSL Lab Session, Apr. 2015.

Billy Bob Brumley, Faster software for fast endomorphisms, Proceeding COSADE 2015 Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, Vol. 9064 (Apr. 2015).
http://dx.doi.org/10.1007/978-3-319-21476-4_9

Korea TTA, 128-bit Block Cipher LEA and its Modes of Operation, 2014.

OpenSSL, How to Integrate a Symmetric Cipher:

https://wiki.openssl.org/index.php/How_to_Integrate a Symmetric Cipher


Ardupilot, MAVLink Commands:

http://ardupilot.org/dev/docs/mavlink-commands.html


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2021 Praise Worthy Prize