用户名: 密码: 验证码:
针对民用无人机的遥控数据保护方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Remote Control Data Protection Method for Civilian UAV
  • 作者:胡子杰 ; 张帆 ; 沈继忠 ; 赵新杰
  • 英文作者:HU Zijie;ZHANG Fan;SHEN Jizhong;ZHAO Xinjie;College of Information Science and Electronic Engineering,Zhejiang University;Institute of North Electronic Equipment;
  • 关键词:无人机 ; 控制链路伪造攻击 ; 遥控数据安全 ; 加密算法 ; 防御效果评估 ; AES算法
  • 英文关键词:Unmanned Aerial Vehicle(UAV);;control link spoofing attack;;remote control data security;;encryption algorithm;;defense effectiveness evaluation;;AES algorithm
  • 中文刊名:JSJC
  • 英文刊名:Computer Engineering
  • 机构:浙江大学信息与电子工程学院;北方电子设备研究所;
  • 出版日期:2019-04-15
  • 出版单位:计算机工程
  • 年:2019
  • 期:v.45;No.499
  • 基金:国家自然科学基金(61472357,61571063,61471314);; 国家留学基金(CSC201606325012)
  • 语种:中文;
  • 页:JSJC201904018
  • 页数:8
  • CN:04
  • ISSN:31-1289/TP
  • 分类号:106-113
摘要
随着民用无人机技术的发展,无人机所面临的安全问题逐渐暴露。基于控制链路伪造攻击原理,通过攻击实例证实民用无人机存在遥控数据安全强度过低的隐患,并提出一种基于加密算法的遥控数据保护方法。分析加密算法的选取原则,从安全和实现性能2个方面对AES、PRESENT和RC4这3种加密算法的可行性进行分析,选取AES算法对无人机系统控制链路中的遥控数据包进行加密。最后,利用不同遥控数据之间的差异系数和相关性系数评估该方法的有效性。实验结果表明,该方法能够有效提高民用无人机遥控数据的安全性。
        With the development of the civilian Unmanned Aerial Vehicle(UAV) technology,the security problem for UAV is gradually exposed.Based on the principle of control link spoofing attack,it is proved that the security intensity of remote control data is too low for civilian UAV by an attack example,and a remote control data protection method based on encryption algorithm is proposed.The selection principle of encryption algorithm is discussed,and the feasibility of three encryption algorithms AES,PRESENT and RC4 are analyzed from two aspects of security and performance.The AES algorithm is selected to encrypt the remote control data packet in the control link of UAV system.Finally,the effectiveness of the method is analyzed quantitatively by using the coefficient of difference and correlation between different remote control data.Experimental results show that this method can effectively improve the safety of remote control data for civilian UAV.
引文
[1] 马克,孙迅,聂裕平.GPS生成式欺骗干扰关键技术[J].航天电子对抗,2014,30(6):24-26.
    [2] SU J,HE J,CHENG P,et al.A stealthy GPS spoofing strategy for manipulating the trajectory of an unmanned aerial vehicl[J].IFAC-PapersOnLine,2016,49(22):291-296.
    [3] KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636.
    [4] KIM A,WAMPLER B,GOPPERT J,et al.Cyber attack vulnerabilities analysis for unmanned aerialvehicles[M].[S.l.]:Infotech,2013.
    [5] DAVIDSON D,WU H,JELLINEK R,et al.Controlling UAVs with sensor input spoofing attacks[C]//Proceedings of the 10th USENIX Conference on Offensive Technologies.San Francisco,USA:USENIX Association,2016:221-231.
    [6] CHILDERS B.Hacking the parrot A.R.drone[J].Linux Journal,2014(241):1.
    [7] PLEBAN J S,BAND R,CREUTZBURG R .Hacking and securing the AR.Drone 2.0 quadcopter:investigations for improving the security of a toy[C]//Proceedings of 2014 Mobile Devices and Multimedia:Enabling Technologies,Algorithms,and Applications.San Francisco,USA:[s.n.],2014:1-12.
    [8] NILSR.Hacking a professional drone[EB/OL].[2017-11-20].https://www.rsaconference.com/events/us16/agenda/sessions/2273/hacking-a-professional-drone.
    [9] GMXP.315晚会报道的无人机是怎么被劫持的?[EB/OL].[2017-11-20].https://security.tencent.com/index.php/blog/msg/103.
    [10] 张兴凯,王喜发,戴紫彬.无人机遥控指令加密方式的研究[J].电子技术应用,2008,34(5):141-144.
    [11] BOGDANOV A,KHOVRATOVICH D,RECHBERGER C,et al.Biclique cryptanalysis of the full AES[C]//Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2011:344-371.
    [12] PAUL C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[M].Berlin,Germany:Springer,1996:104-113.
    [13] MANTIN I,SHAMIR A.A practical attack on broadcast RC4[M].Berlin,Germany:Springer,2001:152-164.
    [14] DAWNERP.RC4加密已不再安全,破解效率极高[EB/OL].[2017-11-20].http://www.freebuf.com/news/72622.html.
    [15] MANIFAVAS C,HATZIVASILIS G,FYSARAKIS K,et al.Lightweight cryptography for embedded systems-a comparative analysis[M].Berlin,Germany:Springer,2014:333-349.
    [16] 张兴凯,王喜发,隗云.无人机上行链路的安全策略研究[J].计算机安全,2008(3):62-64.
    [17] DEWANGAN C P,AGRAWAL S,MANDAL A K,et al.Study of avalanche effect in AES using binary codes[C]//Proceedings of 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies.Washington D.C.,USA:IEEE Press,2012:183-187.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700