2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials 2015
DOI: 10.1109/icstm.2015.7225390
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of MAV communication using Caesar Cipher cryptography

Abstract: This paper suggests the improvement of security in Micro Aerial Vehicle (MAV) communication protocol for the communication between the Ground Control Station (GCS) and the MAV. Proposed method involves the implementation of the Caesar Cipher method of data encryption with a secured key. The method of Ciphering is used for authentication of the Micro Aerial Vehicle at the beginning of the communication. Later the same is used for critical command, control and parameter messages at varied frequencies. This resul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 6 publications
(2 reference statements)
0
12
0
Order By: Relevance
“…Subsequently, an encryption mechanism RC5 is used in [19] to secure the MAVLink communication protocol. In [20], [21], the Caesar cipher cryptography algorithm is used for data encryption of MAVLink messages between the ground station and the Micro Aerial Vehicles (MAV). However, in this method, the secret key is sent as a plain text to the drone, during the establishment phase.…”
Section: A: Confidentiality Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, an encryption mechanism RC5 is used in [19] to secure the MAVLink communication protocol. In [20], [21], the Caesar cipher cryptography algorithm is used for data encryption of MAVLink messages between the ground station and the Micro Aerial Vehicles (MAV). However, in this method, the secret key is sent as a plain text to the drone, during the establishment phase.…”
Section: A: Confidentiality Solutionsmentioning
confidence: 99%
“…i) SYMMETRIC KEY SOLUTIONS: A symmetric encryption algorithm AES-GCM is used in [18], [28] to ensure the authenticity of the transmitted signals. In [20], [21], the authors tackled the problem of authentication using the Caesar Cipher method in the MAVLink protocol. To guarantee a secured communication between the UAV and the GCS, the drone is authenticated at the beginning of the communication using Cesar Ciphering.…”
Section: D: Authenticity Solutionsmentioning
confidence: 99%
“…Ensuring security has become increasingly necessary and important for the wide adoption of UAV systems. The existing security methods proposed for UAV systems can be classified into hardware [17], [18] and software approaches [13], [15], [19].…”
Section: Related Workmentioning
confidence: 99%
“…Rajatha et al [9] research focused on the authentication of Micro Aerial Vehicles (MAV) communication using Caesar cipher cryptography. The authors proposed a methodology for data encryption and authentication of MAV protocol messages between the ground station and the MAV using the Caesar cipher; this was achieved using a shift operator to rotate the character positions by a fixed number, referred to as a key.…”
Section: Literature Reviewmentioning
confidence: 99%