A Research on the Security of Drone Control Data Using Quantum Entropy-Based Random Number Generator
![]() |
Kim, Tae-Wan
(Kookmin University)
Lee, Se-Yoon (Kookmin University) Jung, Seo-Woo (Kookmin University) Wi, Han-saem (Kookmin University) Yi, Ok-yeon (Kookmin University) |
1 | N. Buthcer and A. Stewart "Securing the MAVLink Communication for Unmanned Aircraft Systems," CSSE14-02, University of Appalachian State and University of Auburn, 2014 |
2 | TTA, "TTAK.K0-12.0235/R2", Dec. 2020. |
3 | SEONG-MIN CHO, EUNGI HONG, and SEUNG-HYUN SEO, "Random Number Generator Using Sensors for Drone," IEEE Access, vol. 8, pp. 30343-30354, Feb. 2020. DOI |
4 | Jungmin Park, Seongjoon Cho, Taejin Lim, and Mark Tehranipoor, "QEC: A Quantum Entropy Chip and Its Applications," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 28, pp. 1471-1484, June. 2020. DOI |
5 | Rakel Haakegaard, Joanna Lang, "The Elliptic Curve Diffie-Hellman (ECDH)," Dec. 2015. |
6 | Marin Feldhofer, Sandra Dominikus, and Johannes Wolkersstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," CHES 2004, vol. 3156, Aug. 2004. |
7 | KISA, "Password Algorithm and Key Length Usage Guide," December, 2018 |
8 | SECG, "SEC 1: Elliptic Curve Cryptography", Apr. 2009. |
9 | PX4, "Pixhawk", https://px4.io/, Feb. 2021. |
10 | Microchip, "SMART SAM G55G SAM G55J Data sheet", May. 2016. |
11 | EYL, "ENTROPY CHIP: GAME CHANGER FOR IoT SECURITY," Dec. 2016 |
12 | Anis Koubaa, Azza Allouch, Maram Alajlan, Yasir Javed, Abdelfettah Belghith, and Mohamed Khalgui, "Micro Air Vehicle Link (MAVLink) in a Nutshell: A survery," IEEE Access, vol. 7, pp. 87658-87680, June. 2019. DOI |
13 | GitHub, "mavlink" www.github.com/mavlink, Feb. 2021. |
14 | Quyuh Dang, "Recommendation for Applications Using Approved Hash Algorithms,", 800-107 Rev 1, Aug. 2012. |
15 | Seong-Min Cho, Seung-Hyun Seo, "Status of cryptographic technologies applied to drone security," Journal of the Korea Institute of Information Security & Cryptology, 30(2), pp. 11-19, Apr. 2020. |
16 | Si-hoon Moon, Min-woo Kim and Tae-kyung Kwon, "Trends in lightweight cryptographic technology for IoT communication environment," The Journal of The Korean Intitute of Communication Sciences, 33(3), pp. 80-86, Feb. 2016. |
17 | "A Study on the Domestic and Foreign Tr ends of Drone Industry Based on 4th Ind ustrial Revolution,", https://www.gb.go.kr/Main/open_contents/section/economy/page.do?mnu_uid=2874&BD_CODE=bbs_gongji&cmd=2&B_NUM=70035301&B_STEP=70035300&V_NUM, Feb. 2021. |
18 | You-sung Kang, Ju-han Kim, Kun-woo Kim and Seung-Gwang Lee. "Security Requirements for Drone-based Services," TTAK.KO-12.0317, June. 2016. |
19 | Yong-hyun Yoon, Kyung-ryun Oh, Sung-hoon Shin, Sang-seop Lee and Dong-geun Lee, "Industry Guide for Global Technical Regulations on Drone(Unmanned Aircraft)," KATS(Korean Agency for Technology and Standards), KSA(Korea Standard Association), 2018-2, Jan. 2018. |
20 | Joseph A. Marty, "Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft," Mar. 2014. |
21 | Tarun Kumar Goyal, Vineet Sahula, "Light Weight Security Algorithm for Low Power IoT Devices," 2016 ICACCI (International Conference on Advances in Computing, Communications and Informatics), Sep. 2016. |
22 | Myoung-su Kim, Il-sun You and Kang-bin Yim, "Analysis of Fragility and Response Technology of Unmanned Mobile Drone," Journal of the Korea Institute of Information Security & Cryptology, 30(2), pp. 49-57, Apr. 2020. |
![]() |