Secured Communication for Missile Navigation
نویسنده
چکیده
In order to improve the security of the Military kinds of network this work is proposed. Here the position of missile navigates as per the user’s requirement. The user sends the co-ordinates through pc based server on the base station. For security purpose encryption is done with RC4algorithm implementation. The system that uses Human Computer Interaction and Visualization technology provides several encryption algorithms and key generators. Keywords— missile navigation, RC4 algorithm, VNC, PN sequence, USB, encryption INTRODUCTION In today’s world enemy warfare is an important factor of any nation’s security. The national security mainly depends on army (ground), navy (sea), air-force (air).The important and vital role is played by the army’s artillery such as scud missile, Bo force guns etc. As the name suggests we are making a secure Navigation of Missile using encryption based RC4 algorithm. This is done with the use of an encryption key. This encryption key specifies how the message is to be encoded. An authorized party is able to decode the cipher text using a decryption algorithm, which usually requires a secret decryption key that adversaries do not have access to. There are various types of encryption as AES, DES, and RC4 Algorithm etc. Encryption has long been used by militaries and governments to facilitate secret communication. An encryption based on chaos and AES algorithm [1]where the design and realization of an encryption system is based on the algorithm on ARM(S3C6410), which can encrypt and decrypt the information in many kinds of memorizers, such as UDisk, SD card and mobile HDD. The system that uses Human-Computer Interaction and Visualization technology provides several encryption algorithms and key generators. In this paper, they designed and implemented an encryption system to encrypt the stored data based on ARM (S3C6410). The PN sequences with good properties are generated from chaotic map and the system provides two kinds of encryption algorithm, one is stream cipher with XOR operation, the other is a hybrid algorithm of AES and chaos. In order to improve the security of the private information in memorizer, an encryption algorithm, which inherits the advantages of chaotic encryption, stream cipher and AES algorithm, is proposed in this paper. The chaotic selective encryption of compressed video (CS ECV) exploits the characteristics of the compressed video [2]. Encryption is needed to protect the multimedia data. Compared with text encryption; multimedia encryption has some unique characteristics, such as the large size, high throughput, and real-time processing. An efficient, secure, and lightweight encryption algorithm is desirable to protect the compressed video. A video clip is generally compressed in a transform Domain with some type of entropy coding. To protect a compressed video, encryption techniques can be applied to the original data, such as block swapping, or the data can be transformed using DCT or wavelet coefficients, entropy-coded bit streams, or format headers. The encryption has three separate layers that can be selected according to the security needs of the application and the processing capability of the client computer. The chaotic pseudo-random sequence generator used to generate the key-sequence to randomize the important fields in the compressed video stream has its parameters encrypted by an asymmetric cipher and placed into the stream. The resulting stream is still a valid video stream. CSECV has significant advantages over existing algorithms for security, decryption speed, implementation flexibility, and error preservation. The paper presents the design and implementation of a software application for the provision of secure real time communication services between workstations, based on the AES prototype cryptographic algorithm and an advanced secret key management system [3]. The application has been designed based on the requirements of a military unit, so as to allow groups of authenticated users to International Journal of Engineering Research and General Science Volume 2, Issue 4, June-July, 2014 ISSN 2091-2730 399 www.ijergs.org communicate and read the transmitted messages. This application can be used as the basis for the design of an integrated communication system for a military organization. The present design confines its operation within the limits of a local area network, but the possibilities are open for operation in extended networks or the internet. Advanced Encryption Standard (AES) is the most secure symmetric encryption technique that has gained worldwide acceptance. ―FPGA implementations of advanced Encryption standard: a survey‖ presents the AES based on the Rijndael Algorithm which is an efficient cryptographic technique that includes generation of ciphers for encryption and inverse ciphers for decryption[4]. Higher security and speed of encryption/decryption is ensured by operations like Sub Bytes (S-box)/Inv. (Inv.S-box), Mix Columns/Inv. Mix Columns and Key Scheduling. Extensive research has been conducted into development of S-box /Inv. S-Box and Mix Columns/Inv. Mix Columns on dedicated ASIC and FPGA to speed up the AES algorithm and to reduce circuit area. This is an attempt, to survey in detail, the work conducted in the aforesaid fields. The prime focus is on the FPGA implementations of optimized novel hardware architectures and algorithms. Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm [5]. The paper shows that these attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of counter measures have been proposed. In this paper, a fault detection scheme for the Advanced Encryption Standard is proposed. They present its details implementation in each transformation of the AES. The simulation results show that the fault coverage achieves 99.999% for the proposed scheme. Moreover, the proposed fault detection scheme has been implemented on Xilinx Virtex-5 FPGA. Its area overhead and frequency degradation have been compared and it is shown that the proposed scheme achieves a good performance in terms of area and frequency.
منابع مشابه
Adaptive Fusion of Inertial Navigation System and Tracking Radar Data
Against the range-dependent accuracy of the tracking radar measurements including range, elevation and bearing angles, a new hybrid adaptive Kalman filter is proposed to enhance the performance of the radar aided strapdown inertial navigation system (INS/Radar). This filter involves the concept of residual-based adaptive estimation and adaptive fading Kalman filter and tunes dynamically the fil...
متن کاملIntegrated fuzzy guidance law for high maneuvering targets based on proportional navigation guidance
An integrated fuzzy guidance (IFG) law for a surface to air homing missile is introduced. The introduced approach is a modification of the well-known proportional navigation guidance (PNG) law. The IFG law enables the missile to approach a high maneuvering target while trying to minimize control effort as well as miss-distance in a two-stage flight. In the first stage, while the missile is far ...
متن کاملA Modified Proportional Navigation Guidance for Accurate Target Hitting
When a detector sensitive to the target plume IR seeker is used for tracking airborne targets, the seeker tends to follow the target hot point which is a point farther away from the target exhaust and its fuselage. In order to increase the missile effectiveness, it is necessary to modify the guidance law by adding a lead bias command. The resulting guidance is known as target adaptive guidance ...
متن کاملLocal navigation strategies for a team of robots
-Whenever a mobile robot has to deal with an environment that is totally or partially unknown or dynamically changing, local navigation strategies are very important for the robot to successfully achieve its goals. Unfortunately, local navigation algorithms that have been proposed in the literature offer poor performance (or even fail) whenever the geometry of the free space in which the robot ...
متن کاملGuidance Law Evaluation for Missile Guidance Systems
In missile guidance system, to reduce the interception “miss distance,” it is important to choose a suitable guidance law and navigation constant. This paper investigates and compares the system behavior of guidance laws under different navigation constants. Based on use of the adjoint technique, miss distance sensitivity analyses which consider the system noise, target step maneuver, initial h...
متن کاملA Novel SINS/CNS Integrated Navigation Algorithm used in a Ballistic Missile
The position and velocity errors are divergent of traditional navigation algorithms used in ballistic missile for it cannot estimate the bias of accelerometer precisely. To solve this problem, a novel SINS/CNS integrated navigation algorithm is proposed in this paper, which adds high angle error, azimuth angle error and height error on the basis of the traditional navigation method. As these th...
متن کامل