2017 First IEEE International Conference on Robotic Computing (IRC) 2017
DOI: 10.1109/irc.2017.56
|View full text |Cite
|
Sign up to set email alerts
|

Security Authentication System Using Encrypted Channel on UAV Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(31 citation statements)
references
References 5 publications
0
31
0
Order By: Relevance
“…Yoon et al [16], proposed a solution to network channel or physical hardware hijacking of commercial UAVs by anonymous attackers. The solution proposed here was to exploit an additional encrypted communication channel, an authentication algorithm, and perform DoS attack through Raspberry Pi to maintain UAV control in hijacking situations.…”
Section: Detection Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Yoon et al [16], proposed a solution to network channel or physical hardware hijacking of commercial UAVs by anonymous attackers. The solution proposed here was to exploit an additional encrypted communication channel, an authentication algorithm, and perform DoS attack through Raspberry Pi to maintain UAV control in hijacking situations.…”
Section: Detection Schemesmentioning
confidence: 99%
“…• The use of the modular concept for a completely localized approach • The clustering process with automatic equilibrium to realize the formation of the UAVs and capture their formation • Resistance to intruding UAVs • Excessive blocking of maneuvers • Random noise generation in three directions that injects the overhead into the network • Not covering most lethal attacks [16] In this study, a method was developed to prevent the abduction of network channels or physical hardware by unidentified attackers on commercial airless systems. This paper proposes an additional encrypted communication channel, authentication algorithm, and denial of service attack through the likelihood of pi and its high applicability in commercial UAV systems…”
Section: Security Schemesmentioning
confidence: 99%
“…Ensuring security has become increasingly necessary and important for the wide adoption of UAV systems. The existing security methods proposed for UAV systems can be classified into hardware [17], [18] and software approaches [13], [15], [19].…”
Section: Related Workmentioning
confidence: 99%
“…In [18], the authors proposed the idea of an additional encrypted communication channel to enhance the security of data in UAVs through Raspberry Pi. This channel was designed to regain control of the UAV in case it was target to attack.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the challenges are the (a) trust and information verification, (b) the key distribution for maintaining secure channels, and (c) the forwarding algorithms for finding the best route. Some of the most common attacks are (1) identity and geographical position revealing, (2) Denial of Service (DoS), (3) Sybil attack creating the illusion of several cars with the same ID, (4) Spam to increase the latency of network transmissions, (5) Man in the Middle (MiM), in which a node listens and injects false information in the communication between two nodes, (6) black hole attack, by always declaring having the shortest path, (7) cheating with position info.…”
Section: Introductionmentioning
confidence: 99%