1 |
D. Hong, J.-K. Lee, D.-C. Kim, D.Kwon, K. H. Ryu, and D.-G. Lee,"LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," Lect Notes Comput Sc,pp. 3-27, 2014
|
2 |
Kwon, D., Kim, J., Park, S., Sung, S.H., Sohn, Y., Song, J. H., ... and Hong, J. "New block cipher: ARIA". InInternational conference oninformation security and cryptologypp. 432-445, 2003
|
3 |
Guillen-Perez, A., Sanchez-Iborra, R.,Cano, M.D., Sanchez-Aarnoutse, and J.C.,Garcia-Haro, J., "Wifi networkson drones" In: 2016 ITU Kaleidoscope:ICTs for a Sustainable World(ITUWT). pp. 1-8, 2016
|
4 |
Khan, N.A., Jhanjhi, N.Z., Brohi, S.N., and Nayyar, A., "Emerging use of uav's: secure communication protocol issues and challenges" In: Drones in smart-cities, pp. 37-55, 2020
|
5 |
Iqbal, S., "A study on uav operatingsystem security and future researchchallenges" In: 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). pp. 0759-0765,2021
|
6 |
Koubaa, A., Allouch, A., Alajlan, M., Javed, Y., Belghith, A., and Khalgui, M., "Micro air vehicle link (mavlink) in a nutshell" A survey. IEEE Access 7, pp. 87658-87680, 2019
DOI
|
7 |
Hassija, V., Chamola, V., Agrawal, A., Goyal, A., Luong, N.C., Niyato, D., Yu, F.R., Guizani, and M., "Fast, reliable, and secure drone communication" A comprehensive survey. IEEE Communications Surveys & Tutorials, 2021
|
8 |
Marty, J.A., "Vulnerability analysisof the mavlink protocol for commandand control of unmanned aircraft" Tech. rep. (2013)
|
9 |
Dey, V., Pudi, V., Chattopadhyay, A.,and Elovici, Y., "Security vulnerabilities of unmannedaerial vehicles and countermeasures: An experimental study" In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID). pp. 398-403, 2018
|
10 |
Son, Y., Shin, H., Kim, D., Park, Y.,Noh, J., Choi, K., Choi, J., and Kim,Y., "Rocking drones with intentional sound noise on gyroscopic sensors" In:24th USENIX Security Symposium(USENIX Security 15). pp. 881-896,2015
|
11 |
Kwon, Y.M., Yu, J., Cho, B.M., Eun, Y., and Park, K.J. "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles" IEEE Access 6, 43203-43212, 2018
DOI
|
12 |
PX4 github. Website. [Online]https://github.com/PX4/PX4-Autopilot.git, accessed: 2022-03
|
13 |
Dworkin, M. J., Barker, B.,Nechvatal, J. R., Foti, J., Bassham,L. E., Roback, E., and Dray Jr, J.(2001). "Advanced EncryptionStandard (AES)", NIST FIPS-197.
|
14 |
Common Criteria for Information Technology Security Evaluation, version 3.1, revision 5. part 2:Functional Security Components. 2017
|
15 |
Shoufan, A., AlNoon, H., and Baek,J., "Secure communication incivil drones" In: International Conferenceon Information Systems Security and Privacy. pp. 177-195, 2015
|
16 |
Hartmann, K., and Steup, C., "Thevulnerability of uavs to cyberattacks-an approach to the riskassessment" In: 2013 5th international conference on cyber conflict (CYCON2013). pp. 1-23, 2013
|
17 |
Arteaga, S.P., Hernandez, L.A.M.,Perez, G.S., Orozco, A.L.S., and Villalba, L.J.G., "Analysis of the gps spoofing vulnerability in the drone 3dr solo" IEEE Access 7, 51782-51789, 2019
DOI
|
18 |
Atoev, S., Kwon, O.J., Kim, C.Y., Lee, S.H., Choi, Y.R., and Kwon, K.R. "The secure uav communication link based on otp encryption technique" In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN). pp. 1-3, 2019
|
19 |
Domin, K., Symeonidis, I., and Marin, E., "Security analysis of the drone communication protocol" Fuzzing the mavlink protocol, 2016
|
20 |
Jeong, S., Park, E., Seo, K.U., Do Yoo, J., and Kim, H.K., "Muvids: False mavlink injection attack detection in communication for unmanned vehicles" In: Workshop on Automotive and Autonomous Vehicle Security (AutoSec). vol. 2021, pp. 25, 2021
|
21 |
TTAS.KO-12.0004/R1, "128-bit BlockCipher SEED", 2005
|
22 |
Allouch, A., Cheikhrouhou, O., Koubaa, A., Khalgui, M., and Abbes, T., "Mavsec: Securing the mavlink protocol for ardupilot/px4 unmanned aerial systems" In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). pp. 621-628, 2019
|
23 |
Rani, C., Modares, H., Sriram, R.,Mikulski, D., Lewis, F.L., "Security of unmanned aerial vehicle systemsagainst cyber-physical attacks" TheJournal of Defense Modeling and Simulation 13(3), 331-342 (2016)
DOI
|