Font Size: a A A

Research On Security Of UAV Communication Protocol

Posted on:2021-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:S N LiFull Text:PDF
GTID:2392330614470802Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,due to the convenience of its technology and application,unmanned aeria vehicles have become more and more common in military and civilian fields.It provides people with more convenient and quality services,but also brings a series of security issue.Unmanned aerial vehicles cannot use large antennas like large aircraft,and there is no professional staff to directly operate on the body.Therefore,the unmanned aerial vehicle must transmit the status data to the ground control station in real time.Its communication network system is open,and attackers can use various means to launch attacks on drones.This paper analyzes the security problems faced by drones and related solutions through research on the market and literature,and then designs the identity authentication protocol and secure communication protocol of drones.The main work is to realize the identity authentication protocol between the micro aircraft and the ground control station on the premise of ensuring the lightweight and real-time communication of the UAV,and also to implement the security mechanism of the communication protocol.The specific parts are as follows:(1)This paper designs an identity authentication protocol based on elliptic curve encryption algorithm,which meets the requirements of light weight and real-time;not only the ground control station is required to authenticate the micro aircraft,but also the micro aircraft is required to authenticate the ground control station.The two-way identity authentication is realized,which further meets the security requirements.(2)This paper analyzes the existing security mechanism of the UAV communication protocol and improves it,and designs an encryption mechanism based on the SM4 algorithm.Encrypt the specified fields of the UAV communication protocol so that only two parties that have passed the identity authentication can interpret the key information fields.Not only meet the needs of lightweight and real-time,but also meet the needs of security.(3)The UAV communication protocol studied in this paper is based on the ground control station system.And the experiment is carried out on the Linux platform,with multiple groups of comparison groups as a reference,the performance test of the scheme designed in this article is carried out,and the results are analyzed and evaluated.This paper describes the specific flow of the design scheme in detail,and analyzes the security of the protocol by building an attack model.Compared with variousschemes in efficiency,the scheme designed in this paper has higher efficiency,meets the requirements of light weight and real-time,and is suitable for the safe communication between the micro aircraft and the ground control station.
Keywords/Search Tags:Drone, Communication protocol, Identity authentication protocol, Block cipher
PDF Full Text Request
Related items