Authentication and Encryption Drone Communication by Using HIGHT Lightweight Algorithm
Main Article Content
Abstract
Extensive use of unmanned aerial vehicles (commonly referred to as a “drone”) has posed security and safety challenges. To mitigate security threats caused by flights of unauthorized drones, we proposed an authentication and security system based on the Chaotic maps and stream cipher lightweight HIGHT algorithm. The proposed system is specifically designed aims to minimize the computational and lower consumption of drone resources and deal with one ground control station (GCS) and one Drone with the number of fly sessions. The proposed system initially generates a flight session key for a drone having a flight plan based on the proposed key generation method using 1d Chebyshev chaotic map and registers the flight session key and its flight plan into a centralized database that can be accessed by. Then drone using HIGHT lightweight to cipher payload data to increase security MAVLink communication protocol and send it to GCS, and finally a GCS checks authentication of the current flight session based on the flight session key and its flight plan as the message authentication code key to authenticate the drone by any flight session while the drone is flying. The experiment results using the NIST test prove the proposed key generation method is able to produce unique and random fly session key, also the results of the error sensitive metrics proved the security of the proposed system using HIGHT block cipher lightweight that is an automatic cryptographic protocol verifier.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.