| 研究生: |
陳彥廷 Chen, Yen-Ting |
|---|---|
| 論文名稱: |
應用通訊加密演算法於無人機通訊系統之傳輸研究 Study on Transmission of Encryption Algorithm in UAV Communication System |
| 指導教授: |
賴維祥
Lai, Wei-Hsiang |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 航空太空工程學系 Department of Aeronautics & Astronautics |
| 論文出版年: | 2023 |
| 畢業學年度: | 111 |
| 語文別: | 中文 |
| 論文頁數: | 79 |
| 中文關鍵詞: | 四旋翼無人機 、MAVLink 、加密演算法 、無人機通訊加密系統 |
| 外文關鍵詞: | UAV, Quadcopter drone, MAVLink, Encryption Algorithm, unmanned aerial vehicle Communication Encryption System |
| 相關次數: | 點閱:87 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來無人機的蓬勃發展下,使用頻率劇增,這也使其資安問題逐漸浮上檯面。MAVLink(Micro Aerial Vehicle Link),是目前被廣泛應用於地面控制站與無人機之間的通訊協議,但卻不會對傳輸內容做加密處理,這對於通訊系統的機密性是一大漏洞,且容易遭受到惡意攻擊。本研究以建立無人機通訊加密系統為目標,首先會利用ChaCha20、Salsa20與Rabbit三種對稱加密演算法,來建立加密演算法函數庫,將MAVLink通訊協議下的通訊資料進行加密處理。並將Ardupilot飛控韌體程式進行改寫、編譯與燒錄來建立無人機通訊加密系統,再透過實驗測試系統完整性和傳輸情況。
最後實驗測試結果,無人機通訊加密系統能夠在無人機執行飛行任務時,能有效的防止惡意人士的連接嘗試,並成功地將MAVLink資料包的資料內容進行加密處理,降低了MAVLink通訊協議的漏洞,增加了無人機系統的安全,此外無人機通訊加密系統中,Salsa20、Chacha20與Rabbit三種加密演算法的傳輸量表現相近,對於無人機通訊系統的傳輸量影響相對較小,且三種加密演算法都展現不錯的實用性。
In recent years, with the flourishing development of unmanned aerial vehicles (UAVs), their usage has significantly increased, bringing the issue of information security to the forefront. The MAVLink (Micro Aerial Vehicle Link) protocol is widely employed for communication between ground control stations and UAVs. However, it lacks encryption, posing a significant vulnerability in terms of communication confidentiality and making it susceptible to malicious attacks. This research aims to establish an unmanned aerial vehicle communication encryption system. It begins by creating a library of encryption algorithms, utilizing ChaCha20, Salsa20, and Rabbit symmetric encryption algorithms to encrypt the communication data under the MAVLink protocol. Subsequently, the Ardupilot flight control firmware is modified, compiled, and burned to create the unmanned aerial vehicle communication encryption system. Experimental testing is conducted to verify system integrity and transmission efficiency.
The experimental results demonstrate that the unmanned aerial vehicle communication encryption system effectively prevents unauthorized connection attempts during UAV flight missions. The MAVLink data is securely encrypted, mitigating vulnerabilities within the protocol and enhancing the overall security of the UAV system. Additionally, the performance of Salsa20, ChaCha20, and Rabbit encryption algorithms in the unmanned aerial vehicle communication encryption system is comparable, showing a minimal impact on transmission efficiency. All three encryption algorithms exhibit promising practicality.
[1] Federal Aviation Administration (2015), Operation and Certification of Small Unmanned Aircraft Systems (1st ed.), USA: Lulu.
[2] Anis Koubâa, Azza Allouch, Maram Alajlan, Yasir Javed, Abdelfettah Belghith and Mohamed Khalgui (2019), “Micro Air Vehicle Link (MAVLink) in a Nutshell: A Survey,” IEEE Access, 7 (7) pp.87658~87680.
[3] Young-Min Kwon, Jaemin Yu, Byeong-Moon Cho, Yongsoon Eun and Kyung-Joon Park (2018), “Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles,” IEEE Access, 6 (6) pp.2169~3536.
[4] Navid Ali Khan, N. Z. Jhanjihi, Sarfraz Nawaz Brohi (2022), “A Secure Communication Protocol for Unmanned Aerial Vehicles,” International Conference on Intelligent Data Communication Technologies and Internet of Things, January.
[5] Jason Andress (2014), The Basics of Information Security (2nd ed.), UK: Syngress.
[6] Shreyank N Gowda (2016), “Innovative enhancement of the Caesar cipher algorithm for cryptography,” International Conference on Advances in Computing, Communication, & Automation, September.
[7] A. Nadeem and M.Y. Javed (2006), “A Performance Comparison of Data Encryption Algorithms,” International Conference on Information and Communication Technologies, August.
[8] Robshaw Matthew (2008), New Stream Cipher Designs: The Estream Finalists (1st ed.), Germany: Springer.
[9] Kaisa Nyberg (2008), Fast Software Encryption (1st ed.), Germany: Springer.
[10] Sugier Jarosław (2013), “Low-cost hardware implementations of Salsa20 stream cipher in programmable devices,” Journal of Polish Safety and Reliability Association, Summer Safety and Reliability Seminars.
[11] Daniel J. Bernstein (2008), “ChaCha, a Variant of Salsa20,” The State of the Art of Stream Ciphers, February.
[12] Rajeev Sobti and Geetha Ganesan(2016), “Analysis of Quarter Rounds of Salsa and Chacha Core and Proposal of an Alternative Design to Maximize Diffusion,” Indian Journal of Science and Technology, 9(3) pp.1~10, January.
[13] Thomas Johansson (2003), Fast Software Encryption (1st ed.), Germany: Springer.
[14] Feng Bao, Moti Yung, Dongdai Lin and Jiwu Jing (2009), Information Security and Cryptology (1st ed.), Germany: Springer.
[15] Tsukasa Ishiguro, Shinsaku Kiyomoto, and Yutaka Miyake(2011), “New Analytic Results of Salsa20 and ChaCha,” Information and Communications Security, pp.225~266, November.
[16] Cygwin Team (2016), Cygwin User Guide (1st ed.), UK: Samurai Media Limited.
[17] Agus Kurniawan (2019), Arduino Mega 2560 A Hands-On Guide for Beginner (1st ed.), USA:PE Press.
[18] https://docs.px4.io/main/en/flight_controller/cubepilot_cube_orange.html
[19] https://docs.px4.io/v1.9.0/en/gps_compass/rtk_gps_hex_here2.html
[20] https://store.tmotor.com/goods.php?id=727
[21] https://store.tmotor.com/goods-367-AIR+20A+4S.html
[22] https://holybro.com/products/sik-telemetry-radio-v3
[23] https://www.tw-futaba.com.tw/zh-tw/
[24] https://github.com/mavlink/c_library_v2
[25] https://www.acute.com.tw/logic-analyzer-zh-tw/product/logic-analyzer/travellogic
校內:2028-08-03公開