{"title":"基于Esalsa20算法的无人机安全通信","authors":"Ibtesam Jomaa, Worud Mahdi Saleh, Rasha Rokan Ismail, Saja Huzber Hussien","doi":"10.46300/9106.2023.17.8","DOIUrl":null,"url":null,"abstract":"The Unmanned Aerial Vehicle (UAV) (sometimes known as a \"\"drone\"\") is used in a variety of fields. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps is required. By using a proposed key generation method which is based on a 1d Logistic chaotic map to produce a flight session key for a drone with a flight plan, and then records the flight session key and the drone’s flight plan in a central database that can be accessed. Finally, while the drone is flying, a GCS checks authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone by any flight session, and the drone after which uses salsa20 lightweight to cipher payload data to improve security Network Transfer of RTCM Messages over Internet Protocol Protocol (NTRIP) communication protocol and send it to GCS, and at last, a GCS verifies authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone. The proposed system is superior to other similar systems in terms of security and performance, according to the review.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"22 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secured Drone Communication Based on Esalsa20 Algorithm\",\"authors\":\"Ibtesam Jomaa, Worud Mahdi Saleh, Rasha Rokan Ismail, Saja Huzber Hussien\",\"doi\":\"10.46300/9106.2023.17.8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Unmanned Aerial Vehicle (UAV) (sometimes known as a \\\"\\\"drone\\\"\\\") is used in a variety of fields. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps is required. By using a proposed key generation method which is based on a 1d Logistic chaotic map to produce a flight session key for a drone with a flight plan, and then records the flight session key and the drone’s flight plan in a central database that can be accessed. Finally, while the drone is flying, a GCS checks authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone by any flight session, and the drone after which uses salsa20 lightweight to cipher payload data to improve security Network Transfer of RTCM Messages over Internet Protocol Protocol (NTRIP) communication protocol and send it to GCS, and at last, a GCS verifies authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone. The proposed system is superior to other similar systems in terms of security and performance, according to the review.\",\"PeriodicalId\":13929,\"journal\":{\"name\":\"International Journal of Circuits, Systems and Signal Processing\",\"volume\":\"22 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Circuits, Systems and Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.46300/9106.2023.17.8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Circuits, Systems and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46300/9106.2023.17.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
Secured Drone Communication Based on Esalsa20 Algorithm
The Unmanned Aerial Vehicle (UAV) (sometimes known as a ""drone"") is used in a variety of fields. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps is required. By using a proposed key generation method which is based on a 1d Logistic chaotic map to produce a flight session key for a drone with a flight plan, and then records the flight session key and the drone’s flight plan in a central database that can be accessed. Finally, while the drone is flying, a GCS checks authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone by any flight session, and the drone after which uses salsa20 lightweight to cipher payload data to improve security Network Transfer of RTCM Messages over Internet Protocol Protocol (NTRIP) communication protocol and send it to GCS, and at last, a GCS verifies authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone. The proposed system is superior to other similar systems in terms of security and performance, according to the review.