Secure Cryptographic Algorithm for a Fault Tolerant model in Unmanned Aerial Vehicles
Abstract
Keywords
References
T.Mangaiyarkarasi and B.Nandhini, Fault and tolerant-method using AES for images, International Journal of Com-munications and Engineering, Vol No.5, Issue:01,March 2012
Roohi Banu, Tanya Vladimirova,and Martin N.Sweeting, IEEE Surrey Space Centre,Fault-Tolerant Encryption for Space Applications (2009)
Sun, W., Stephens, P., and Sweeting, M. Micro-mini Satellites for affordable EO constellations–Rapid Eye and DMC .In Proceedings of the IAA Symposium on Small Satellites for Earth Observation, Berlin, Germany, Apr. 2001,IAA-B3-0603.
Directory of Earth Observation Re- sources. http://directory.eoportal.org/pres TopSat.html (last accessed 18th June 2007).
Mariani, R., and Boschi, G.Scrubbing and partitioning for protection of memory systems. In Proceedings of the 11th IEEE International Symposium on On-Line Testing, July 6—8, 2005, 195—196.
B. Olsen. ―Encryption Gets a Boost‖, Federal Computer Week,August2004,URL: http://www.fcw.com/fcw/articles/2004/0823/fast-encryption.asp
Consultative Committee for Space Data Systems Security threats against space missions. Informational Report CCSDS 350.1-G-1, Green Book, NASA, Washington, D.C., Oct. 2006.
Sweet, K. The increasing threat to satellite communica-tions. Online Journal of Space Communication, 6 (Nov. 2003).
―Critical Infrastructure Protection. Commercial Satellite Security Should Be More Fully Addressed‖, US Government Accountability Office Report, GAO-02-781,August 2002.
K. Poulsen, ―Satellites at Risk of Hacks‖, Security Fo-cus,Oct 2002,URL : http://www.securityfocus.com/news /942
NASA/GSFC. ―IP-in-Space Security Handbook‖, Sep-tember 001.URL:http://ipinspace.gsfc.nasa.gov/documents/
W. Stallings ―Cryptography and Network Security – Principles and Practices‖, 3rdedition, Prentice-Hall, 2002.
B. Schneier, ―Applied Cryptography – Protocols, Algo-rithms and Source Code in C‖, Second Edition.
Advanced Encryption Standard, Wikipe-dia,URL:http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
K. Lauter, ―The advantages of Elliptic Curve Cryptog-raphy for Wireless Security‖, Kristin Lauter, IEEE Wireless Communications, February 2004.
T. Wollinger, J. Guajardo, C. Paar, ― Cryptography in Embedded Systems: AnOverview‖, Proceedings of the Em-bedded World 2003 Exhibition and Conference,pp. 735-744, Design and Electronik, Nurenberg, Germany, February 2003.
H.Weiss,J.Stanier,―SpaceMission Communications Secu-rity, SAW2001URLhttp://sunset.usc.edu/events/GSAW/gsaw2001/SESSION9/Shave.pdf