Browse > Article
http://dx.doi.org/10.6109/jkiice.2021.25.10.1353

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations  

Kim, Byoung-Kug (Department of Computer Software, Induk University)
Hong, Sung-Hwa (Division of Navigational Information System, Mokpo National Maritime University)
Kang, Jiheon (Department of Software, Duksung Women's University)
Abstract
IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.
Keywords
Drone; GCS; UAV; MAVLink; security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Jindal and B. Singh, "A Survey on RC4 Stream Cipher," International Journal of Computer Network and Information Security, vol. 7, pp. 37-45, Jun. 2015.
2 Y. M. Kwon, J. Yu, B. M. Cho, Y. S. Eun, and K. J. Park, "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles," IEEE Access, vol. 6, pp. 43203-43212, 2018.   DOI
3 S. M. Cho and S. H. Seo, "The current status of cryptographic methods for drone security," Korea Institute of Information Security And Cryptology, vol. 30, no. 2, pp. 11-19, Apr. 2020.
4 J. Y. Yoon, H. J. Lee, and K. J. Park, "UAV System Security Enhancement in Wi-Fi Communication Between UAV and GCS," The Journal of Korean Institute of Communications and Information Sciences, vol. 45, no. 4, pp. 686-690, Apr. 2020.   DOI
5 J. M. Yu, J. Y. Yoon, and K. J. Park, "Risk analysis of UAV and GCS for network attacks," Journal of KIISE, vol. 37, no. 1, pp. 29-37, Jan. 2019.
6 A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, "Cyber security threat analysis and modeling of an unmanned aerial vehicle system," in Procedding of 2012 IEEE Conf. Technol. for Homeland Secur. (HST), Waltham, MA, USA, Nov. 2012.
7 J. Y. Yoon, H. J. Lee, and K. J. Park, "Security enhancement in wi-fi communication between UAV and GCS," in Proc. KICS ICC 2019, pp. 400-401, Jun. 2019.
8 M. N. Islam, M. Mia, M. Chowdhury, and M. A. Matin, "Effect of security increment to symmetric data encryption through AES methodology," in Proceeding of Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket: Thailand, pp. 291-294, 2008.
9 E. J. Jung, S. H. Koh, Y. S. Lee, and Y. S. Kim, "Guided Missile Assembly Test Set using Encryption AES Rijndael Algorithm," Journal of Advanced Navigation Technology, vol. 23, no. 5, pp. 339-344, Oct. 2019.
10 MAVLink [Internet]. Available: https://mavlink.io.
11 S. H. Moon, M. W. Kim, and T. K. Kwon, "The trend of light cryptographic methods for IoT communication environments," The Journal of Korean Institute of Communication Sciences, vol. 33, no. 3, pp. 88-86, Feb., 2016.
12 K. H. Lee, "A Modulo Arithmetic Technique for RC4 Hardware Design," Journal of the Institute of Electronics and Information Engineers, vol. 55, no. 7, pp. 119-124, Jul. 2018.   DOI
13 QGroundControl [Internet]. Available: http://qgroundcontrol.com/.