Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.2.133

A Research on the Security of Drone Control Data Using Quantum Entropy-Based Random Number Generator  

Kim, Tae-Wan (Kookmin University)
Lee, Se-Yoon (Kookmin University)
Jung, Seo-Woo (Kookmin University)
Wi, Han-saem (Kookmin University)
Yi, Ok-yeon (Kookmin University)
Abstract
Ardupilot and PX4 are representative open source projects for drones, and drone-controlled open sources are widely used for drone development at home and abroad due to reduced development costs, stability of source code, and rapid development feedback. However there are also fatal drawbacks behind such advantages. Open-source on drones used by various agencies If there are vulnerabilities in data security, all drones used by those agencies are potentially subject to security attacks, this could lead to a series of economic and human losses, depending on the nature of the environment. In this paper, we explain the data security vulnerabilities of MAVLink v1.0, MAVLink v2.0 used in Ardupilot, PX4, and propose object authentication using quantum entropy-based random number generator to respond to them, propose data security, and conduct availability analysis through performance measurement of proposed data security.
Keywords
UAS; Drone; MAVLink; Quantum random number; IoT;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Buthcer and A. Stewart "Securing the MAVLink Communication for Unmanned Aircraft Systems," CSSE14-02, University of Appalachian State and University of Auburn, 2014
2 TTA, "TTAK.K0-12.0235/R2", Dec. 2020.
3 SEONG-MIN CHO, EUNGI HONG, and SEUNG-HYUN SEO, "Random Number Generator Using Sensors for Drone," IEEE Access, vol. 8, pp. 30343-30354, Feb. 2020.   DOI
4 Jungmin Park, Seongjoon Cho, Taejin Lim, and Mark Tehranipoor, "QEC: A Quantum Entropy Chip and Its Applications," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 28, pp. 1471-1484, June. 2020.   DOI
5 Rakel Haakegaard, Joanna Lang, "The Elliptic Curve Diffie-Hellman (ECDH)," Dec. 2015.
6 Marin Feldhofer, Sandra Dominikus, and Johannes Wolkersstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," CHES 2004, vol. 3156, Aug. 2004.
7 KISA, "Password Algorithm and Key Length Usage Guide," December, 2018
8 SECG, "SEC 1: Elliptic Curve Cryptography", Apr. 2009.
9 PX4, "Pixhawk", https://px4.io/, Feb. 2021.
10 Microchip, "SMART SAM G55G SAM G55J Data sheet", May. 2016.
11 EYL, "ENTROPY CHIP: GAME CHANGER FOR IoT SECURITY," Dec. 2016
12 Anis Koubaa, Azza Allouch, Maram Alajlan, Yasir Javed, Abdelfettah Belghith, and Mohamed Khalgui, "Micro Air Vehicle Link (MAVLink) in a Nutshell: A survery," IEEE Access, vol. 7, pp. 87658-87680, June. 2019.   DOI
13 GitHub, "mavlink" www.github.com/mavlink, Feb. 2021.
14 Quyuh Dang, "Recommendation for Applications Using Approved Hash Algorithms,", 800-107 Rev 1, Aug. 2012.
15 Seong-Min Cho, Seung-Hyun Seo, "Status of cryptographic technologies applied to drone security," Journal of the Korea Institute of Information Security & Cryptology, 30(2), pp. 11-19, Apr. 2020.
16 Si-hoon Moon, Min-woo Kim and Tae-kyung Kwon, "Trends in lightweight cryptographic technology for IoT communication environment," The Journal of The Korean Intitute of Communication Sciences, 33(3), pp. 80-86, Feb. 2016.
17 "A Study on the Domestic and Foreign Tr ends of Drone Industry Based on 4th Ind ustrial Revolution,", https://www.gb.go.kr/Main/open_contents/section/economy/page.do?mnu_uid=2874&BD_CODE=bbs_gongji&cmd=2&B_NUM=70035301&B_STEP=70035300&V_NUM, Feb. 2021.
18 You-sung Kang, Ju-han Kim, Kun-woo Kim and Seung-Gwang Lee. "Security Requirements for Drone-based Services," TTAK.KO-12.0317, June. 2016.
19 Yong-hyun Yoon, Kyung-ryun Oh, Sung-hoon Shin, Sang-seop Lee and Dong-geun Lee, "Industry Guide for Global Technical Regulations on Drone(Unmanned Aircraft)," KATS(Korean Agency for Technology and Standards), KSA(Korea Standard Association), 2018-2, Jan. 2018.
20 Joseph A. Marty, "Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft," Mar. 2014.
21 Tarun Kumar Goyal, Vineet Sahula, "Light Weight Security Algorithm for Low Power IoT Devices," 2016 ICACCI (International Conference on Advances in Computing, Communications and Informatics), Sep. 2016.
22 Myoung-su Kim, Il-sun You and Kang-bin Yim, "Analysis of Fragility and Response Technology of Unmanned Mobile Drone," Journal of the Korea Institute of Information Security & Cryptology, 30(2), pp. 49-57, Apr. 2020.