A secure communication protocol for civil drones
نویسندگان
چکیده
This paper introduces a secure communication protocol that provides secured pathways to manipulate drones through unsecured communication. The deployment of the proposed works providing two paths; drone’s controller path and data centre path. first has achieved high level security privacy by using modification SHA-1 method an advanced encryption method. is called 83SHA-1. These modifications can increase rounds in stage up 83 rounds, inject each round with expansion S-Boxes procedures are used DES extend length from 160 240 bits then reduce it bits. After hash drone use which Geffe-Genetic (GG) Encryption algorithm where three types keys will be for deception attackers. second accomplishment ensure between datacentre RNA-RADG-CBC (RRCBC) generate initialization vector (IV) cipher block chaining (CBC) randomly, keys, propose encryption/decryption analysis shows promising drones’s data.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA novel secure communication protocol
Quantum key distribution (QKD) is a protocol which is provably secure. Eve cannot gain any information from the qubits transmitted from Alice to Bob without disturbing their state. First , the no-cloning theorem forbids Eve to perfectly clone Alice’s qubit. Second, in any attempt to distinguish between two non-orthogonal quantum states, information gain is only possible at the expense of introd...
متن کاملDeterministic secure communication protocol
Quantum key distribution (QKD) is a protocol which is provably secure, by which private key bit can be created between two parties over a public channel. The key bits can then be used to implement a classical private key cryptosystem, to enable the parties to communicate securely. The basic idea behind QKD is that Eve cannot gain any information from the qubits transmitted from Alice to Bob wit...
متن کاملSecure Protocol For Inter-Vehicle Communication Networks
Security is the main concern in wireless communications. Future vehicles may use wireless Inter-Vehicle Communication (IVC) networks to exchange data among each other. IVC networks provide drivers with updated information on traffic and road conditions for efficient and safe driving. The main challenges in designing secure IVC networks are vehicle authentication and data integrity. Vehicle auth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v27.i3.pp1490-1501