Secure Cryptographic Algorithm for a Fault Tolerant model in Unmanned Aerial Vehicles

Sujatha Rajkumar, Ramakrishnan Malaichamy

Abstract


AES (Advanced Encryption Standard), provides the highest level of security by utilizing the strongest 128 bit Al-gorithm to encrypt and authenticate the data. AES commercial security algorithm has proved to be effective in Unmanned Aerial vehicles which is used for military purpose such as enemy tracking , environmental monitoring meteorology, map making etc .The demand to protect the sensitive and valuable data transmitted from UAV ( Unmanned Aerial Vehicles ) to ground has increased in Defense and hence the need to use onboard encryption . In order to avoid data corruption due to single even upsets (SEU’s) a novel fault tolerant model of AES is presented which is based on the Hamming error cor-rection code. For this work a problem was chosen that first addresses the encryption of UAV imaging data using the effi-cient AES CBC mode .A detailed analysis of the effect of single even upsets (SEUs) on imaging data during on-board encryption is carried out. The impact of faults in the data oc-curring during transmission to ground due to noisy channels is analyzed .The performance for the above fault tolerant model is measured using power and throughput.

Keywords


Onboard Encryption; UAV; Cipher block chain; Single Even Upset; Hamming code

References


T.Mangaiyarkarasi and B.Nandhini, Fault and tolerant-method using AES for images, International Journal of Com-munications and Engineering, Vol No.5, Issue:01,March 2012

Roohi Banu, Tanya Vladimirova,and Martin N.Sweeting, IEEE Surrey Space Centre,Fault-Tolerant Encryption for Space Applications (2009)

Sun, W., Stephens, P., and Sweeting, M. Micro-mini Satellites for affordable EO constellations–Rapid Eye and DMC .In Proceedings of the IAA Symposium on Small Satellites for Earth Observation, Berlin, Germany, Apr. 2001,IAA-B3-0603.

Directory of Earth Observation Re- sources. http://directory.eoportal.org/pres TopSat.html (last accessed 18th June 2007).

Mariani, R., and Boschi, G.Scrubbing and partitioning for protection of memory systems. In Proceedings of the 11th IEEE International Symposium on On-Line Testing, July 6—8, 2005, 195—196.

B. Olsen. ―Encryption Gets a Boost‖, Federal Computer Week,August2004,URL: http://www.fcw.com/fcw/articles/2004/0823/fast-encryption.asp

Consultative Committee for Space Data Systems Security threats against space missions. Informational Report CCSDS 350.1-G-1, Green Book, NASA, Washington, D.C., Oct. 2006.

Sweet, K. The increasing threat to satellite communica-tions. Online Journal of Space Communication, 6 (Nov. 2003).

―Critical Infrastructure Protection. Commercial Satellite Security Should Be More Fully Addressed‖, US Government Accountability Office Report, GAO-02-781,August 2002.

K. Poulsen, ―Satellites at Risk of Hacks‖, Security Fo-cus,Oct 2002,URL : http://www.securityfocus.com/news /942

NASA/GSFC. ―IP-in-Space Security Handbook‖, Sep-tember 001.URL:http://ipinspace.gsfc.nasa.gov/documents/

W. Stallings ―Cryptography and Network Security – Principles and Practices‖, 3rdedition, Prentice-Hall, 2002.

B. Schneier, ―Applied Cryptography – Protocols, Algo-rithms and Source Code in C‖, Second Edition.

Advanced Encryption Standard, Wikipe-dia,URL:http://en.wikipedia.org/wiki/Advanced_Encryption_Standard

K. Lauter, ―The advantages of Elliptic Curve Cryptog-raphy for Wireless Security‖, Kristin Lauter, IEEE Wireless Communications, February 2004.

T. Wollinger, J. Guajardo, C. Paar, ― Cryptography in Embedded Systems: AnOverview‖, Proceedings of the Em-bedded World 2003 Exhibition and Conference,pp. 735-744, Design and Electronik, Nurenberg, Germany, February 2003.

H.Weiss,J.Stanier,―SpaceMission Communications Secu-rity, SAW2001URLhttp://sunset.usc.edu/events/GSAW/gsaw2001/SESSION9/Shave.pdf


Full Text: PDF

Refbacks

  • There are currently no refbacks.