Fast Video Data Encryption for Swarm UAVs Using Hybrid Crypto-system
![]() |
Cho, Seong-Won
(Department of Aerospace Software Engineering, Hanseo University)
Kim, Jun-Hyeong (Department of Aerospace Software Engineering, Hanseo University) Chae, Yeo-Gyeong (Department of Aerospace Software Engineering, Hanseo University) Joung, Yu-Min (Department of Aerospace Software Engineering, Hanseo University) Park, Tae-Kyou (Department of Aerospace Software Engineering, Hanseo University) |
1 | Openssl, How to Integrate a Symmetric Cipher, https://wiki.openssl.org/index.php/How_to_Integrate_a_Symmetric_Cipher |
2 | NSR(National Security Research Institute), Source Code manual of Block Cypher LEA, ver 1.0, October, 2015. |
3 | Hong, D. J. et al., "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," Proc. of WISA 2013, LNCS, vol. 8269, 2014. https://seed.kisa.or.kt/iwt/ko/sup/EgovLeaInfo.do |
4 | Lin, X. et al., "The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles," Ericsson, 2017. |
5 | Qualcomm Technologies, "LTE Unmanned Aircraft Systems, Trial Report v1.0.1," Qualcomm Technologies, Inc., May 2017. |
6 | Weng, L., Liu, Q., Xia, M., and Song, Y. D., "Immune network-based swarm intelligence and its application to unmanned aerial vehicle (UAV) swarm coordination," Neurocomputing, No. 0, 2013. |
7 | ODROID, ODROID-XU4, http://www.hardkernel.com/main/products/prdt_info.php |
8 | Pixhawk2 Autopilot, https://pixhawk.org/modules/pixhawk2#further_info |
9 | Kumar, A. et al., "Symantec White Paper: Elliptic Curve Cryptography (ECC) Certificates Performance Analysis," May 2013. |
10 | Kasper, E., "Fast Elliptic Curve Cryptography in OpenSSL," International Conference on Financial Cryptography and Data Security, Springer LNCS 7126, 2011. |
11 | Joppe, W. et al., "Elliptic Curve Cryptography," Practice Conference on Financial, Springer, 2014. |
12 | Mahto, D., and Yadav, D. K., "RSA and ECC: A Comparative Analysis," International Journal of Applied Engineering Research ISSN 0973-4562, Vol. 12, No. 19, Research India Publications, 2017, pp.9053-9061. |
13 | Korea TTA, 128-bit Block Cipher LEA and its Modes of Operation, 2014. |
14 | Perazzo, P., "Security in Networked Computer Systems OpenSSL Lab Session," Apr. 2015. |
15 | Kim, H., and Steup, C., "The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment," Proc. of 5th International Conference on Cyber Conflict, 2013. |
16 | Brumley, B. B., "Faster software for fast endomorphisms," Proceeding COSADE 2015 Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, Vol. 9064, Apr. 2015. |
17 | Rivera, E., Baykov, R., and Gu, G., "A Study On Unmanned Vehicles and Cyber Security," 2014. |
18 | Boettcher, C. et al., "The MILS Component Integration Approach to Secure Information Sharing," the 27th IEEE/AIAA Digital Avionics Systems Conference(DASC), October, 2008. |
19 | Kim, A., Wampler, B., Goppert, J., and Hwang, I. S., "Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles," Proc. of AIAA2012, June 2012. |
20 | SkySoftware, SkyGrabber, https://www.skygrabber.com, Feb. 2018. |
21 | Jeon, H. S., "Wireless Communication Technology Developement Trend of Drone," Weekly Technology Trend of ETRI , 2017, pp.2-11. |
22 | MAVLink Micro Air Vehicle Communication Protocol, http://qgroundcontrol.com, Feb. 2018. |
![]() |