Browse > Article
http://dx.doi.org/10.5139/JKSAS.2018.46.7.602

Fast Video Data Encryption for Swarm UAVs Using Hybrid Crypto-system  

Cho, Seong-Won (Department of Aerospace Software Engineering, Hanseo University)
Kim, Jun-Hyeong (Department of Aerospace Software Engineering, Hanseo University)
Chae, Yeo-Gyeong (Department of Aerospace Software Engineering, Hanseo University)
Joung, Yu-Min (Department of Aerospace Software Engineering, Hanseo University)
Park, Tae-Kyou (Department of Aerospace Software Engineering, Hanseo University)
Publication Information
Journal of the Korean Society for Aeronautical & Space Sciences / v.46, no.7, 2018 , pp. 602-609 More about this Journal
Abstract
This paper proposes the hybrid crypto-system for fast video data encryption of UAV(Unmanned Aerial Vehicle) under the LTE(Long-Term Evolution) wireless communication environment. This hybrid crypto-system is consisted of ECC(Elliptic Curve Cryptography) public key algorithm and LEA(Light-weight Encryption Algorithm) symmetric key algorithm. ECC is a faster public key algorithm with the same security strength than RSA(Rivest Shamir Adleman), and Korean standard LEA with the same key size is also a faster symmetric key algorithm than AES(Advances Encryption Standard). We have implemented this hybrid crypto-system using OpenSSL, OpenCV and Socket programs under the Swarm 8-UAV. We have shown the efficient adaptability of this hybrid crypto-system for the real-time swarm UAV through the experiments under the LTE communication environment.
Keywords
Swarm UAV; Hybrid Crypto-system; ECC; LEA; Video Encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Openssl, How to Integrate a Symmetric Cipher, https://wiki.openssl.org/index.php/How_to_Integrate_a_Symmetric_Cipher
2 NSR(National Security Research Institute), Source Code manual of Block Cypher LEA, ver 1.0, October, 2015.
3 Hong, D. J. et al., "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," Proc. of WISA 2013, LNCS, vol. 8269, 2014. https://seed.kisa.or.kt/iwt/ko/sup/EgovLeaInfo.do
4 Lin, X. et al., "The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles," Ericsson, 2017.
5 Qualcomm Technologies, "LTE Unmanned Aircraft Systems, Trial Report v1.0.1," Qualcomm Technologies, Inc., May 2017.
6 Weng, L., Liu, Q., Xia, M., and Song, Y. D., "Immune network-based swarm intelligence and its application to unmanned aerial vehicle (UAV) swarm coordination," Neurocomputing, No. 0, 2013.
7 ODROID, ODROID-XU4, http://www.hardkernel.com/main/products/prdt_info.php
8 Pixhawk2 Autopilot, https://pixhawk.org/modules/pixhawk2#further_info
9 Kumar, A. et al., "Symantec White Paper: Elliptic Curve Cryptography (ECC) Certificates Performance Analysis," May 2013.
10 Kasper, E., "Fast Elliptic Curve Cryptography in OpenSSL," International Conference on Financial Cryptography and Data Security, Springer LNCS 7126, 2011.
11 Joppe, W. et al., "Elliptic Curve Cryptography," Practice Conference on Financial, Springer, 2014.
12 Mahto, D., and Yadav, D. K., "RSA and ECC: A Comparative Analysis," International Journal of Applied Engineering Research ISSN 0973-4562, Vol. 12, No. 19, Research India Publications, 2017, pp.9053-9061.
13 Korea TTA, 128-bit Block Cipher LEA and its Modes of Operation, 2014.
14 Perazzo, P., "Security in Networked Computer Systems OpenSSL Lab Session," Apr. 2015.
15 Kim, H., and Steup, C., "The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment," Proc. of 5th International Conference on Cyber Conflict, 2013.
16 Brumley, B. B., "Faster software for fast endomorphisms," Proceeding COSADE 2015 Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, Vol. 9064, Apr. 2015.
17 Rivera, E., Baykov, R., and Gu, G., "A Study On Unmanned Vehicles and Cyber Security," 2014.
18 Boettcher, C. et al., "The MILS Component Integration Approach to Secure Information Sharing," the 27th IEEE/AIAA Digital Avionics Systems Conference(DASC), October, 2008.
19 Kim, A., Wampler, B., Goppert, J., and Hwang, I. S., "Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles," Proc. of AIAA2012, June 2012.
20 SkySoftware, SkyGrabber, https://www.skygrabber.com, Feb. 2018.
21 Jeon, H. S., "Wireless Communication Technology Developement Trend of Drone," Weekly Technology Trend of ETRI , 2017, pp.2-11.
22 MAVLink Micro Air Vehicle Communication Protocol, http://qgroundcontrol.com, Feb. 2018.