ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV
Open Access
- 29 September 2022
- journal article
- Published by Borys Grinchenko Kyiv University in Cybersecurity: Education, Science, Technique
- Vol. 1 (17), 167-186
- https://doi.org/10.28925/2663-4023.2022.17.167186
Abstract
The rapid development of unmanned aerial vehicles (UAVs), as well as the expansion of the list of actions performed by modern UAVs, led to increased requirements for the safety and reliability of data transmission. In the context of warfare, when confidential information is collected, the protection of such information is a top priority. The practical level of conducting aerial reconnaissance during current warfare demonstrates the urgent need to create UAV which capable of performing flight tasks and aerial reconnaissance in the mode of installed radio interference, and also emphasizes the importance of ensuring the data confidentiality about target objects transmitted by an optical channel for the implementation of their processing in automated systems. The paper provides a review and comparative analysis of modern cryptoalgorithms that are used to ensure data confidentiality during their transmission by radio channel from UAV to ground objects. There are the system of criteria (multi criteria analysis) was used to compare following cryptographic algorithms (similar to AES, NESSIE, etc competitions): block and key sizes; modes of operation; encryption speed; memory requirements; resistance (security) to cryptanalysis. The conducted analysis showed that each cryptographic algorithm has advantages and disadvantages. Also, there is no universal cryptographic algorithm that capable to resolve all privacy problems in UAV. According to the limited resources in the process of UAV operation, it is necessary to create a universal set (dataset) of cryptographic algorithms that could solve various problems in different conditions including different aspects of UAV exploitation. It is these studies that will be devoted to the further work of the authors within the framework of the ongoing scientific project.Keywords
This publication has 21 references indexed in Scilit:
- ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Confidential and authenticated communications in a large fixed-wing UAV swarmPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Comparative Study Of AES, Blowfish, CAST-128 And DES Encryption AlgorithmIOSR Journal of Engineering, 2016
- Analysis of SHA-512/224 and SHA-512/256Lecture Notes in Computer Science, 2015
- Improved cryptanalysis combining differential and artificial neural network schemesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Public key cryptography using neural networks and genetic algorithmsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Performance evaluation of cryptographic algorithms: DES and AESPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- A Performance Comparison of Data Encryption AlgorithmsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Constructing Symmetric Ciphers Using the CAST Design ProcedurePublished by Springer Science and Business Media LLC ,1997
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESLecture Notes in Computer Science, 1996