A secure communication protocol for civil drones

نویسندگان

چکیده

This paper introduces a secure communication protocol that provides secured pathways to manipulate drones through unsecured communication. The deployment of the proposed works providing two paths; drone’s controller path and data centre path. first has achieved high level security privacy by using modification SHA-1 method an advanced encryption method. is called 83SHA-1. These modifications can increase rounds in stage up 83 rounds, inject each round with expansion S-Boxes procedures are used DES extend length from 160 240 bits then reduce it bits. After hash drone use which Geffe-Genetic (GG) Encryption algorithm where three types keys will be for deception attackers. second accomplishment ensure between datacentre RNA-RADG-CBC (RRCBC) generate initialization vector (IV) cipher block chaining (CBC) randomly, keys, propose encryption/decryption analysis shows promising drones’s data.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A novel secure communication protocol

Quantum key distribution (QKD) is a protocol which is provably secure. Eve cannot gain any information from the qubits transmitted from Alice to Bob without disturbing their state. First , the no-cloning theorem forbids Eve to perfectly clone Alice’s qubit. Second, in any attempt to distinguish between two non-orthogonal quantum states, information gain is only possible at the expense of introd...

متن کامل

Deterministic secure communication protocol

Quantum key distribution (QKD) is a protocol which is provably secure, by which private key bit can be created between two parties over a public channel. The key bits can then be used to implement a classical private key cryptosystem, to enable the parties to communicate securely. The basic idea behind QKD is that Eve cannot gain any information from the qubits transmitted from Alice to Bob wit...

متن کامل

Secure Protocol For Inter-Vehicle Communication Networks

Security is the main concern in wireless communications. Future vehicles may use wireless Inter-Vehicle Communication (IVC) networks to exchange data among each other. IVC networks provide drivers with updated information on traffic and road conditions for efficient and safe driving. The main challenges in designing secure IVC networks are vehicle authentication and data integrity. Vehicle auth...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2022

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v27.i3.pp1490-1501