Cryptographic system of protection UAVs communication channels against illegal intrusion
DOI:
https://doi.org/10.18372/2225-5036.20.7551Keywords:
information security, cryptography, information interception, cryptanalysis, UAVAbstract
The article provides information on effective cryptographic protection of radio communication «Ground – UAV – Ground». The main threats to UAVs and illegal intrusion methods in communication channel are considered. An example of illegal intrusion into communication channel «Ground – UAV – Ground» is provided. A suggested approach to protect UAVs control telemetry data. The way and hardware-software implementation of «on-board» UAVs protection using the developed encoder is shown. The circuit of connection an encoder to ground and on-board equipment is available. The mechanism of synchronization UAVs with an encoder is considered. The investigation results of protection UAVs communication channel are offered. A description of hardware-software implementation of protection is given. Technical characteristics of hardware implementation of an encoder are presented. The obtained results can improve the efficiency of UAVs information security systems and create the basis for further researches in the field of development new effective information security systems using "on-board" protection that does not change the operation of UAVs.References
Мельников В.П. Информационная безопасность и защита информации: Учебное пособие для вузов по спец. «Информационные системы и технологи» / В.П. Мельников, С.А. Клейменов, А.М. Петраков; Под ред. С.А. Клейменова. — 5-е изд., стер. — М. : Academia, 2011. — 331 с. : ил. — (Высшее профессиональное образование). — Библиогр.: с. 327-328
Фленов М. Компьютер глазами хакера / М.Е. Фленов. — 3-е изд., перераб. и доп. — СПб. : БХВ — Петербург, 2012. — 264 с. : ил. — Библиогр.: с. 260.
Електронний ресурс. — Режим доступу: http://www.intelsecurity.com/solutions/intel-data-protection-technology.html
Електронний ресурс. — Режим доступу: http://www.elbitsystems.com
Електронний ресурс]. — Режим доступу: uk.wikipedia.org/wiki/Трансивер
Патент UA №94189 «Спосіб криптографічного перетворення інформації».
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.