Browse > Article

드론 보안에 적용된 암호 기술 현황  

Cho, Seong-Min (한양대학교 대학원 전자공학과)
Seo, Seung-Hyun (한양대학교 ERICA 캠퍼스 전자공학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. M. Cho, E. Hong, and S. H. Seo, "Random Number Gererator Using Sensors for Drone," IEEE Access, Vol.8, pp.30343-30354, 2020.   DOI
2 J. Won, S. H. Seo, and Bertino, "A Secure Communication Protocol for Drones and Smart Objects," Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015.
3 K. G. Paterson, "A comparison between traditional public key infrastructures and Identity-based Cryptography," Information Security Technical Report, vol. 8, no. 3, pp. 57-72, 2003.   DOI
4 J. Won, S. H. Seo, and E. Bertino, "Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications," IEEE Access, vol. 5, pp. 3721-3749, 2017.   DOI
5 I. Avdonin, M. Budko, M. Budko, V. Grozov, and A. Guirik, "A method of creating perfectly secure data transmission channel between unmanned aerial vehicle and ground control station based on One-Time pads," in Proc. 9th Int. Congr. Ultra Modern Telecommun. Control Syst. Workshops (ICUMT), pp. 410-413, 2017.
6 D. J. Bernstein, "Chacha, a variant of salsa20," in Workshop Record of SASC, vol. 8, pp. 3-5, 2008..
7 A. Allouch, O. Cheikhrouhou, A. Koubaa, M. Khalgui, and T. Abbes, "MAVSec: Securing the MAVLink protocol for ardupilot/PX4 unmanned aerial systems," arXiv:1905.00265. [Online]. Available: http://arxiv.org/abs/1905.00 265, 2019.
8 S. H. Seo, J. Won, E. Bertino, Y. Kang, and D. Choi, "A Security Framework for a Drone Delivery Service," in Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, ser. DroNet '16. ACM, pp. 29-34, 2016.
9 T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. OHanlon, and P. M. Kintner, Jr., "Assessing the spoofing threat: Development portable GPS civilian spoofer," Proceedings of the ION GNSS Meeting. Institute of Navigation, Savannah, GA, pp. 2314-2325, 2008.
10 H. Wen, P. T. Huang, J. Dyer, A. Archinal, and J. Fagan, "Countermeasures for GPS signal spoofing," Proceedings of the 18th International Technical Meeting of the Satellite Division of The Institute of Navigation, pp. 1285-1290, 2005.
11 V. Dehghanian, J. Nielsen, and G. Lachapelle, "GNSS spoofing detection based on signal power measurements: statistical analysis," Hindawi International Journal of Navigation and Observation, pp. 1-8. 2012.
12 A. Jovanovic, C. Botteron, and P.-A. Farine, "Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers," in Proc. IEEE/ION Position, Location and Navigation Symposium, pp. 1258-1271, 2014.
13 X. Chen, F. Dovis, M. Pini, and P. Mulassano, "Turbo architecture for multipath mitigation in global navigation satellite system receivers," IET Radar, Sonar and Navigation, vol. 5, no. 5, pp. 517-527, 2011.   DOI
14 K. Wesson, M. Rothlisberger, and T. Humphreys, "Practical Cryptographic Civil GPS Signal Authentication," journal of the Institute of Navigation, 59(3), 177-193, 2012.   DOI
15 이세원, "美정부, 중국산 드론에도 경계령..."보안정보 탈취 우려,"" 연합뉴스, https://www.yna.co.kr/view/AKR20190521064300009?section=search, 2019.
16 국토교통부, "아프리카 하늘로 한국 드론 뜬다", 보도자료, 2020.
17 김대종, 임륭혁, "국토관리를 위한 무인항공기 활용 사례," 국토정책 Brief, 578, 1-8, 2016.
18 TTA 표준, "드론 기반 서비스를 위한 보안 요구사항," TTAK.KO-12.0317, 2016.
19 A. Koubaa, B. Qureshi, M. F. Sriti, A. Allouch, Y. Javed, M. Alajlan, O. Cheikhrouhou, M. Khalgui, and E. Tovar, "Dronemap planner: A service-oriented cloud-based management system for the internet-of-drones," Ad Hoc Networks, vol. 86, pp. 46-62, 2019.   DOI
20 Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. J. Park, "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles," IEEE Access, vol. 6, pp. 43203-43212, 2018.   DOI
21 J. A. Marty, "Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft," Tech. Rep., 2013.
22 L. Meier, "smavlink-secure mavlink, request for comments," Available: http://www.diydrones.co m/profiles/blogs/smavlink-secure-mavlinkreques t-for-comments, 2013.
23 Y. Mo and B. Sinopoli, "False data injection attacks in control systems," in Proceedings of the 1st Workshop on Secure Control Systems, 2010.
24 R. N. Dean, G. T. Flowers, A. S. Hodel, G. Roth, S. Castro, R. Zhou, A. Moreira, A. Ahmed, R. Rifki, B. E. Grantham, D. Bittle, and J. Brunsch, "On the degradation of MEMS gyroscope performance in the presence of high power acoustic noise," in IEEE Intl. Symp. on Industrial Electronics, 2007.
25 Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, "Rocking drones with intentional sound noise on gyroscopic sensors," In Proceedings of the 24th USENIX Conference on Security Symposium, USENIX Association, pp. 881-896, 2015.
26 신동연, "해킹 쉬운 드론, GPS 교란시켜 빼돌릴수 있을까," 중앙일보, https://news.joins.com/article/23177968, 2018.
27 D. McCallie, J. Butts, and R. Mills, "Security analysis of the ADS-B implementation in the next generation air transportation system," International Journal of Critical Infrastructure Protection, 4(2), pp. 78-87, 2022.   DOI
28 A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, "Unmanned aircraft capture and control via GPS spoofing," Journal of Field Robotics, vol. 31, no. 4, pp. 617-636, 2014.   DOI