2017 International Conference on Unmanned Aircraft Systems (ICUAS) 2017
DOI: 10.1109/icuas.2017.7991460
|View full text |Cite
|
Sign up to set email alerts
|

Improving communication security of open source UAVs: Encrypting radio control link

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…However, no countermeasures are discussed. The authors in [366] introduce an implementation of an encrypted Radio Control (RC) link that can be used with a number of popular RC transmitters. The proposed design uses Galois Embedded Crypto library together with openLRSng open-source radio project.…”
Section: Security Challengesmentioning
confidence: 99%
“…However, no countermeasures are discussed. The authors in [366] introduce an implementation of an encrypted Radio Control (RC) link that can be used with a number of popular RC transmitters. The proposed design uses Galois Embedded Crypto library together with openLRSng open-source radio project.…”
Section: Security Challengesmentioning
confidence: 99%
“…In [16], the authors proposed an encrypted radio control link based on Galois Embedded Crypto library with the openLRSng open-source radio project for securing communication links among open source UAV systems. The proposed solution uses the symmetric key produced by a trusted third-party entity and manually hard-coded in the autopilot.…”
Section: A: Confidentiality Solutionsmentioning
confidence: 99%
“…Because all of the internet traffic is encrypted with the SSH protocol, which is generally trusted to be secure [31], the overall system is secure. It is even more secure than traditional UAV control methods, which can be spoofed [96], [97] allowing a remote operator to take control of the bird. No such spoofing is believed to be possible with SSH.…”
Section: B Securitymentioning
confidence: 99%