1 |
S. M. Cho, E. Hong, and S. H. Seo, "Random Number Gererator Using Sensors for Drone," IEEE Access, Vol.8, pp.30343-30354, 2020.
DOI
|
2 |
J. Won, S. H. Seo, and Bertino, "A Secure Communication Protocol for Drones and Smart Objects," Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015.
|
3 |
K. G. Paterson, "A comparison between traditional public key infrastructures and Identity-based Cryptography," Information Security Technical Report, vol. 8, no. 3, pp. 57-72, 2003.
DOI
|
4 |
J. Won, S. H. Seo, and E. Bertino, "Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications," IEEE Access, vol. 5, pp. 3721-3749, 2017.
DOI
|
5 |
I. Avdonin, M. Budko, M. Budko, V. Grozov, and A. Guirik, "A method of creating perfectly secure data transmission channel between unmanned aerial vehicle and ground control station based on One-Time pads," in Proc. 9th Int. Congr. Ultra Modern Telecommun. Control Syst. Workshops (ICUMT), pp. 410-413, 2017.
|
6 |
D. J. Bernstein, "Chacha, a variant of salsa20," in Workshop Record of SASC, vol. 8, pp. 3-5, 2008..
|
7 |
A. Allouch, O. Cheikhrouhou, A. Koubaa, M. Khalgui, and T. Abbes, "MAVSec: Securing the MAVLink protocol for ardupilot/PX4 unmanned aerial systems," arXiv:1905.00265. [Online]. Available: http://arxiv.org/abs/1905.00 265, 2019.
|
8 |
S. H. Seo, J. Won, E. Bertino, Y. Kang, and D. Choi, "A Security Framework for a Drone Delivery Service," in Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, ser. DroNet '16. ACM, pp. 29-34, 2016.
|
9 |
T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. OHanlon, and P. M. Kintner, Jr., "Assessing the spoofing threat: Development portable GPS civilian spoofer," Proceedings of the ION GNSS Meeting. Institute of Navigation, Savannah, GA, pp. 2314-2325, 2008.
|
10 |
H. Wen, P. T. Huang, J. Dyer, A. Archinal, and J. Fagan, "Countermeasures for GPS signal spoofing," Proceedings of the 18th International Technical Meeting of the Satellite Division of The Institute of Navigation, pp. 1285-1290, 2005.
|
11 |
V. Dehghanian, J. Nielsen, and G. Lachapelle, "GNSS spoofing detection based on signal power measurements: statistical analysis," Hindawi International Journal of Navigation and Observation, pp. 1-8. 2012.
|
12 |
A. Jovanovic, C. Botteron, and P.-A. Farine, "Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers," in Proc. IEEE/ION Position, Location and Navigation Symposium, pp. 1258-1271, 2014.
|
13 |
X. Chen, F. Dovis, M. Pini, and P. Mulassano, "Turbo architecture for multipath mitigation in global navigation satellite system receivers," IET Radar, Sonar and Navigation, vol. 5, no. 5, pp. 517-527, 2011.
DOI
|
14 |
K. Wesson, M. Rothlisberger, and T. Humphreys, "Practical Cryptographic Civil GPS Signal Authentication," journal of the Institute of Navigation, 59(3), 177-193, 2012.
DOI
|
15 |
이세원, "美정부, 중국산 드론에도 경계령..."보안정보 탈취 우려,"" 연합뉴스, https://www.yna.co.kr/view/AKR20190521064300009?section=search, 2019.
|
16 |
국토교통부, "아프리카 하늘로 한국 드론 뜬다", 보도자료, 2020.
|
17 |
김대종, 임륭혁, "국토관리를 위한 무인항공기 활용 사례," 국토정책 Brief, 578, 1-8, 2016.
|
18 |
TTA 표준, "드론 기반 서비스를 위한 보안 요구사항," TTAK.KO-12.0317, 2016.
|
19 |
A. Koubaa, B. Qureshi, M. F. Sriti, A. Allouch, Y. Javed, M. Alajlan, O. Cheikhrouhou, M. Khalgui, and E. Tovar, "Dronemap planner: A service-oriented cloud-based management system for the internet-of-drones," Ad Hoc Networks, vol. 86, pp. 46-62, 2019.
DOI
|
20 |
Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. J. Park, "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles," IEEE Access, vol. 6, pp. 43203-43212, 2018.
DOI
|
21 |
J. A. Marty, "Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft," Tech. Rep., 2013.
|
22 |
L. Meier, "smavlink-secure mavlink, request for comments," Available: http://www.diydrones.co m/profiles/blogs/smavlink-secure-mavlinkreques t-for-comments, 2013.
|
23 |
Y. Mo and B. Sinopoli, "False data injection attacks in control systems," in Proceedings of the 1st Workshop on Secure Control Systems, 2010.
|
24 |
R. N. Dean, G. T. Flowers, A. S. Hodel, G. Roth, S. Castro, R. Zhou, A. Moreira, A. Ahmed, R. Rifki, B. E. Grantham, D. Bittle, and J. Brunsch, "On the degradation of MEMS gyroscope performance in the presence of high power acoustic noise," in IEEE Intl. Symp. on Industrial Electronics, 2007.
|
25 |
Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, "Rocking drones with intentional sound noise on gyroscopic sensors," In Proceedings of the 24th USENIX Conference on Security Symposium, USENIX Association, pp. 881-896, 2015.
|
26 |
신동연, "해킹 쉬운 드론, GPS 교란시켜 빼돌릴수 있을까," 중앙일보, https://news.joins.com/article/23177968, 2018.
|
27 |
D. McCallie, J. Butts, and R. Mills, "Security analysis of the ADS-B implementation in the next generation air transportation system," International Journal of Critical Infrastructure Protection, 4(2), pp. 78-87, 2022.
DOI
|
28 |
A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, "Unmanned aircraft capture and control via GPS spoofing," Journal of Field Robotics, vol. 31, no. 4, pp. 617-636, 2014.
DOI
|