This paper introduces a secure communication protocol that provides secured communication pathways to manipulate drones through unsecured communication. The deployment of the proposed protocol works through providing two secured communication paths; drones to the drone’s controller path and controller to data centre path. The first secured communication path has achieved a high level of security and privacy by using a modification of SHA-1 method and an advanced encryption method. The modification of the SHA-1 is called 83SHA-1. These modifications can increase rounds in the first stage up to 83 rounds, inject each round with expansion and S-Boxes procedures that are used in DES to extend length from 160 to 240 bits then reduce it from 240 to 160 bits. After hash data from the drone then use the advanced encryption method which is called Geffe-Genetic (GG) Encryption algorithm where three types of keys will be used for deception attackers. The second accomplishment is to ensure providing secure communication between the drone’s controller and datacentre by using RNA-RADG-CBC (RRCBC) encryption algorithm where will generate an initialization vector (IV) for cipher block chaining (CBC) randomly, generate keys, and propose an encryption/decryption method. The security analysis shows a promising high security level of drones’s data.
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from unauthorized individuals. Encryption is a mechanism of converting plain-text into cipher-text in order to be unreadable by unwanted people. In this review, we explain some important cryptography primitives ( symmetric and asymmetric cryptography algorithms) with examples for each type. Comparative study is making among this cryptography primitives according to many parameters such as structure, speed, block size and others parameters.
The acknowledgment of IoT requires a colossal measure of sensor hubs which have limited battery power, memory, computational latency and communication bandwidth to obtain contributions from the associated objects. In the current developments of the resource constraint environments, the trend is shifted towards lightweight cryptographic algorithm. Many lightweight cryptographic algorithms have been developed and also existing algorithms are modified in terms of resource constraint environment. In this paper we analyzed a very popular block cipher AES-128 and tried to make it lightweight regarding energy consumption. In modified AES algorithm an execution of the AES mix columns operation is proposed, combine the add round-key operation with mix-columns to perform in one cycle, the shift-row operation has been modified to shift-rows and shift-columns and reduction in number of rounds to 6 rounds only for modified AES and compare the results of standard algorithm and modified algorithms. The proposed algorithms passed the statistical test suite, also the new algorithms faster than standard AES in term of implementation. In security term the modified algorithm for 6 round has more confusion and diffusion percent because of the modified in mix-columns and shift-rows operations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.