2023
DOI: 10.3390/drones7080507
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to the Implementation of a Neural Network for Cryptographic Protection of Data Transmission at UAV

Abstract: An approach to the implementation of a neural network for real-time cryptographic data protection with symmetric keys oriented on embedded systems is presented. This approach is valuable, especially for onboard communication systems in unmanned aerial vehicles (UAV), because of its suitability for hardware implementation. In this study, we evaluate the possibility of building such a system in hardware implementation at FPGA. Onboard implementation-oriented information technology of real-time neuro-like cryptog… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…Routing problems are widely covered in the world's scientific literature. These are works of a system-wide nature, which analyze, for example, static and dynamic routing 2 of 16 or centralized and decentralized routing [2,3], as well as works that analyze, compare, and improve specific protocols under certain conditions. In particular, many works are devoted to the implementation of the widely used OSPF protocol in Wide Area Networks (WANs) [4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Routing problems are widely covered in the world's scientific literature. These are works of a system-wide nature, which analyze, for example, static and dynamic routing 2 of 16 or centralized and decentralized routing [2,3], as well as works that analyze, compare, and improve specific protocols under certain conditions. In particular, many works are devoted to the implementation of the widely used OSPF protocol in Wide Area Networks (WANs) [4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…To provide security at data transmission, different approaches are proposed. For example, a neural network for real-time cryptographic data protection oriented on unmanned aerial vehicles is presented in [16], for which data protection from damage or loss in the wireless channel between it and the remote control center is critical. The study in [17] proposes the concept of calculating the info-communication system reliability indicator of operating under the probable impact of typical cyber-physical attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An unmanned aerial vehicle (UAV), also referred to as a flying robot or drone, possesses the ability to operate independently or under remote control for specific missions [1]. In recent times, UAVs have garnered considerable attention as a result of advancements in microprocessors [2,3] and artificial intelligence (AI) [4][5][6][7], sensors [8][9][10][11][12][13][14], and the design [15][16][17][18] and manufacturing process [16][17][18][19][20], facilitating the creation of intelligent UAVs. The term "intelligent UAVs" refers to these drones' capacity to operate autonomously or semi-autonomously, making real-time decisions based on data from their sensors and AI algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…An unmanned aerial vehicle (UAV), also referred to as a flying robot or drone, possesses the ability to operate independently or under remote control for specific missions [1]. In recent times, UAVs have garnered considerable attention as a result of advancements in microprocessors [2,3] and artificial intelligence (AI) [4][5][6], sensors [7] as well as design [8][9][10][11][12][13][14][15] and manufacturing process [16][17][18][19][20] facilitating the creation of intelligent UAVs [21]. These technologically advanced UAVs offer a multitude of benefits, including cost efficiency and exceptional maneuverability, leading to their utilization in diverse military and civilian domains such as mine clearance, surveillance, delivery services, wireless connectivity, and agriculture [22,23].…”
Section: Introductionmentioning
confidence: 99%