簡易檢索 / 詳目顯示

研究生: 陳彥廷
Chen, Yen-Ting
論文名稱: 應用通訊加密演算法於無人機通訊系統之傳輸研究
Study on Transmission of Encryption Algorithm in UAV Communication System
指導教授: 賴維祥
Lai, Wei-Hsiang
學位類別: 碩士
Master
系所名稱: 工學院 - 航空太空工程學系
Department of Aeronautics & Astronautics
論文出版年: 2023
畢業學年度: 111
語文別: 中文
論文頁數: 79
中文關鍵詞: 四旋翼無人機MAVLink加密演算法無人機通訊加密系統
外文關鍵詞: UAV, Quadcopter drone, MAVLink, Encryption Algorithm, unmanned aerial vehicle Communication Encryption System
相關次數: 點閱:87下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來無人機的蓬勃發展下,使用頻率劇增,這也使其資安問題逐漸浮上檯面。MAVLink(Micro Aerial Vehicle Link),是目前被廣泛應用於地面控制站與無人機之間的通訊協議,但卻不會對傳輸內容做加密處理,這對於通訊系統的機密性是一大漏洞,且容易遭受到惡意攻擊。本研究以建立無人機通訊加密系統為目標,首先會利用ChaCha20、Salsa20與Rabbit三種對稱加密演算法,來建立加密演算法函數庫,將MAVLink通訊協議下的通訊資料進行加密處理。並將Ardupilot飛控韌體程式進行改寫、編譯與燒錄來建立無人機通訊加密系統,再透過實驗測試系統完整性和傳輸情況。
    最後實驗測試結果,無人機通訊加密系統能夠在無人機執行飛行任務時,能有效的防止惡意人士的連接嘗試,並成功地將MAVLink資料包的資料內容進行加密處理,降低了MAVLink通訊協議的漏洞,增加了無人機系統的安全,此外無人機通訊加密系統中,Salsa20、Chacha20與Rabbit三種加密演算法的傳輸量表現相近,對於無人機通訊系統的傳輸量影響相對較小,且三種加密演算法都展現不錯的實用性。

    In recent years, with the flourishing development of unmanned aerial vehicles (UAVs), their usage has significantly increased, bringing the issue of information security to the forefront. The MAVLink (Micro Aerial Vehicle Link) protocol is widely employed for communication between ground control stations and UAVs. However, it lacks encryption, posing a significant vulnerability in terms of communication confidentiality and making it susceptible to malicious attacks. This research aims to establish an unmanned aerial vehicle communication encryption system. It begins by creating a library of encryption algorithms, utilizing ChaCha20, Salsa20, and Rabbit symmetric encryption algorithms to encrypt the communication data under the MAVLink protocol. Subsequently, the Ardupilot flight control firmware is modified, compiled, and burned to create the unmanned aerial vehicle communication encryption system. Experimental testing is conducted to verify system integrity and transmission efficiency.
    The experimental results demonstrate that the unmanned aerial vehicle communication encryption system effectively prevents unauthorized connection attempts during UAV flight missions. The MAVLink data is securely encrypted, mitigating vulnerabilities within the protocol and enhancing the overall security of the UAV system. Additionally, the performance of Salsa20, ChaCha20, and Rabbit encryption algorithms in the unmanned aerial vehicle communication encryption system is comparable, showing a minimal impact on transmission efficiency. All three encryption algorithms exhibit promising practicality.

    中文摘要 I 英文摘要 II 誌謝 VI 目錄 VII 表目錄 XII 圖目錄 XIII 符號表 XVII 第一章 緒論 1 1.1 前言與研究動機 1 1.2 文獻回顧 2 1.2.1 無人機通訊系統的安全威脅與漏洞 2 1.2.2 無人機通訊加密 4 1.2.3 加密演算法的性能差異 5 1.2.4 文獻回顧總結 7 1.3 研究目的 7 1.4 論文架構 8 第二章 理論基礎與傳輸資料結構 10 2.1 研究方法與流程 10 2.2 加密演算法介紹 11 2.2.1 對稱加密演算法(Symmetric Key Algorithm) 11 2.3 Salsa20加密演算法 12 2.3.1 初始密鑰流(Initial Keystream) 12 2.3.2 核函數(Core Function) 13 2.3.3 偽隨機密鑰流(Pseudo-random Keystream) 19 2.3.4 加密與解密(Encryption & Decryption) 19 2.4 Chacha20加密演算法 20 2.4.1 初始密鑰流(Initial Keystream) 21 2.4.2 核函數(Core Function) 21 2.4.3 偽隨機密鑰流(Pseudo-random Keystream) 25 2.4.4 加密與解密(Encryption & Decryption) 25 2.5 Rabbit加密演算法 26 2.5.1 邏輯移位(Logical Shift) 27 2.5.2 位元串聯 (Bitwise Concatenation) 29 2.5.3 內部狀態(Internal state) 29 2.5.4 核函數(Core Function) 30 2.5.5 計算器系統(Counter System) 32 2.5.6 密鑰設置(Key Setup) 33 2.5.7 初始向量設置(IV Setup) 34 2.5.8 偽隨機密鑰流(Pseudo-random Keystream) 36 2.5.9 加密與解密(Encryption & Decryption) 37 2.6 MAVLink通訊協議 38 2.6.1 MAVLink資料包結構 38 第三章 實驗設備介紹 40 3.1 無人機系統(UAV) 40 3.1.1 四旋翼無人機 40 3.1.2 飛行控制器 41 3.1.3 全球定位系統(Global Positioning System, GPS)接收器 42 3.1.4 動力系統 43 3.1.5 數據傳輸器 44 3.1.6 無人機遙控設備 45 3.2 嵌入式電腦系統 47 3.2.1 Arduino 47 3.2.2 c_library_v2 48 3.3 協定分析設備 49 3.3.1 協定分析儀 49 第四章 通訊加密系統建立 51 4.1 通訊加密系統建立 51 4.2 加密演算法函數庫建置 52 4.2.1 Salsa20與Chacha20加密演算法函數庫 52 4.2.2 Rabbit加密演算法函數庫 55 4.3 函數庫引入與韌體程式改寫 56 4.4 韌體編譯與燒錄 58 4.4.1 Cygwin軟體 58 4.4.2 編譯結果 59 第五章 實驗結果與分析 62 5.1 無人機通訊加密系統完整性測試 62 5.1.1 加密功能完整度檢測 63 5.1.2 實際飛行任務檢測 68 5.2 無人機通訊加密系統傳輸測試 70 第六章 結論與未來工作 74 6.1 結論 74 6.2 未來工作 75 參考文獻 77

    [1] Federal Aviation Administration (2015), Operation and Certification of Small Unmanned Aircraft Systems (1st ed.), USA: Lulu.
    [2] Anis Koubâa, Azza Allouch, Maram Alajlan, Yasir Javed, Abdelfettah Belghith and Mohamed Khalgui (2019), “Micro Air Vehicle Link (MAVLink) in a Nutshell: A Survey,” IEEE Access, 7 (7) pp.87658~87680.
    [3] Young-Min Kwon, Jaemin Yu, Byeong-Moon Cho, Yongsoon Eun and Kyung-Joon Park (2018), “Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles,” IEEE Access, 6 (6) pp.2169~3536.
    [4] Navid Ali Khan, N. Z. Jhanjihi, Sarfraz Nawaz Brohi (2022), “A Secure Communication Protocol for Unmanned Aerial Vehicles,” International Conference on Intelligent Data Communication Technologies and Internet of Things, January.
    [5] Jason Andress (2014), The Basics of Information Security (2nd ed.), UK: Syngress.
    [6] Shreyank N Gowda (2016), “Innovative enhancement of the Caesar cipher algorithm for cryptography,” International Conference on Advances in Computing, Communication, & Automation, September.
    [7] A. Nadeem and M.Y. Javed (2006), “A Performance Comparison of Data Encryption Algorithms,” International Conference on Information and Communication Technologies, August.
    [8] Robshaw Matthew (2008), New Stream Cipher Designs: The Estream Finalists (1st ed.), Germany: Springer.
    [9] Kaisa Nyberg (2008), Fast Software Encryption (1st ed.), Germany: Springer.
    [10] Sugier Jarosław (2013), “Low-cost hardware implementations of Salsa20 stream cipher in programmable devices,” Journal of Polish Safety and Reliability Association, Summer Safety and Reliability Seminars.
    [11] Daniel J. Bernstein (2008), “ChaCha, a Variant of Salsa20,” The State of the Art of Stream Ciphers, February.
    [12] Rajeev Sobti and Geetha Ganesan(2016), “Analysis of Quarter Rounds of Salsa and Chacha Core and Proposal of an Alternative Design to Maximize Diffusion,” Indian Journal of Science and Technology, 9(3) pp.1~10, January.
    [13] Thomas Johansson (2003), Fast Software Encryption (1st ed.), Germany: Springer.
    [14] Feng Bao, Moti Yung, Dongdai Lin and Jiwu Jing (2009), Information Security and Cryptology (1st ed.), Germany: Springer.
    [15] Tsukasa Ishiguro, Shinsaku Kiyomoto, and Yutaka Miyake(2011), “New Analytic Results of Salsa20 and ChaCha,” Information and Communications Security, pp.225~266, November.
    [16] Cygwin Team (2016), Cygwin User Guide (1st ed.), UK: Samurai Media Limited.
    [17] Agus Kurniawan (2019), Arduino Mega 2560 A Hands-On Guide for Beginner (1st ed.), USA:PE Press.
    [18] https://docs.px4.io/main/en/flight_controller/cubepilot_cube_orange.html
    [19] https://docs.px4.io/v1.9.0/en/gps_compass/rtk_gps_hex_here2.html
    [20] https://store.tmotor.com/goods.php?id=727
    [21] https://store.tmotor.com/goods-367-AIR+20A+4S.html
    [22] https://holybro.com/products/sik-telemetry-radio-v3
    [23] https://www.tw-futaba.com.tw/zh-tw/
    [24] https://github.com/mavlink/c_library_v2
    [25] https://www.acute.com.tw/logic-analyzer-zh-tw/product/logic-analyzer/travellogic

    無法下載圖示 校內:2028-08-03公開
    校外:2028-08-03公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE