Method for Implementing Cryptographic Protection of Channels to Organize Communication via MAVLink Protocol when Control of Autonomous UAVS
https://doi.org/10.21869/2223-1536-2022-12-4-122-141
Abstract
Purpose of research. Development of proposals for the implementation of cryptographic protection of channels for organizing communication using the MA VLink protocol when controlling autonomous unmanned aerial vehicles.
Methods. When conducting research and developing a method for implementing channel protection for the organization of communication via the MA VLink protocol when controlling autonomous unmanned aerial vehicles, multicriteria analysis methods were used. The initial firmware check is performed when the autopilot is loaded/initialized. In this case, methods are used to check the contents of the autopilot memory, such as using a hashing chain with a random request, which may require a static hash for comparison. To counteract the threats of the functional flight control module, it is recommended to use IDS (Intrusion detection systems). IDS is usually software and hardware that checks the system for anomalies and deviations.
Results. A method for implementing cryptographic channel protection for the organization of communication via the MA VLink protocol when controlling autonomous unmanned aerial vehicles based on the ChaCha20 encryption algorithm is proposed. The analysis and synthesis of methods for ensuring the security of control channels and data transmission between the NPU and autonomous unmanned aerial vehicles has been carried out. The analysis of the AES- CTR, AES-CBC, ChaCha20 and RC4 encryption protocols was performed, the results of which made it possible to establish ChaCha20 as the most suitable method of cryptographic protection of UA Vs running MA VLink. The results of experiments conducted to test the ChaCha20 encryption algorithm showed that the use of this algorithm does not affect the performance of the MAVLink protocol, since it uses the same processor time.
Conclusion. The analysis of methods of cryptographic protection of channels for the organization of communication using the MAVLink protocol when controlling autonomous unmanned aerial vehicles is carried out, on the basis of which a method for implementing channel protection using the MA VLink protocol when controlling UA Vs based on the ChaCha20 encryption algorithm is proposed.
About the Authors
A. V. Alena V. KhmelevskayaRussian Federation
Alena V. Khmelevskaya, Senior Lecturer of the Department of Space Instrumentation and Communication Systems
50 Let Oktyabrya Str. 94, Kursk 305040
A. A. Sevryukov
Russian Federation
Anton A. Sevryukov, Chief Specialist
5 Radishcheva Str., Kursk 305000
A. E. Sevryukov
Russian Federation
Alexander E. Sevryukov, Associate Professor of the Department of Space Instrumentation and Communication Systems
50 Let Oktyabrya Str. 94, Kursk 305040
I. G. Babanin
Russian Federation
Ivan G. Babanin, Cand. of Sci. (Engineering), Associate Professor, Associate Professor of the Department of Space Instrumentation and Communication Systems
50 Let Oktyabrya Str. 94, Kursk 305040
E. Yu. Babanina
Russian Federation
Ekaterina Yu. Babanina, Student of the Department of Space Instrumentation and Communication Systems
50 Let Oktyabrya Str. 94, Kursk 305040
References
1. Bespilotnye aviatsionnye sistemy [Unmanned aircraft systems]. Available at: https://cdn.standards.iteh.ai/samples/70853/7ec34c8a22bf46958423b7e3a2e43693/ISO-21384-3-2019.pdf (accessed 05.08.2022)
2. Allouch A., Cheikhrouhou O., Koubaa A. MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems. International Wireless Communications and Mobile Computing Conference (IWCMC). Morrocco, 2019. https://doi.org/10.1109/IWCMC.2019.8766667
3. Leccadito M. A Hierarchical Architectural Framework for Securing Unmanned Aerial Systems. Virginia Commonwealth University. Richmond, 2016. 122 p. https://doi.org/10.25772/0DK3-E418
4. Yagdereli E., Gemci C., Ziya Akta§ A. A study on cyber-security of autonomous and unmanned vehicles. Journal of Defense Modeling and Simulation, 2015, no. 12 (4). https://doi.org/10.1177/1548512915575803
5. Sugihara M. A dynamic continuous signature monitoring technique for reliable microprocessors. IEICE Trans. Electron, 2011, vol. 94 (4), pp. 477-486. https://doi.org/10.1587/ transele.E94.C.477
6. Horst R., Harris L. Multiple instruction issue in the NonStop Cyclone processor. ACM SIGARCH Computer Architecture News, 1990, vol. 18, pp. 216-226. https://doi.org/10.1109/ISCA.1990.134528
7. Gonzalez C., Reed R. Detecting unauthorized software execution in SDR using power fingerprinting. Military Communications Conference. San Diego, MiLcom, 2010, pp. 22112216. https://doi.org/10.1109/MILC0M.2010.5680393
8. Khmelevskaya A. V., Mikhailova N. Yu., Nikolaenko A. I. [Methods of auditing the security of information systems]. Infokommunikatsii i kosmicheskie tekhnologii: sostoyanie, problemy i puti resheniya. Sbornik nauchnykh statei po materialam V Vserossiiskoi nauchno-prakticheskoi konferentsii [Infocommunications and space technologies: state, problems and solutions. Collection of scientific articles on the materials of the V All-Russian Scientific and Practical Conference]. Kursk, Southwest State University Publ., 2021, pp. 171-175. (In Russ.)
9. Dovbnya V. G., Koptev D. S., Babanin I. G., Knyazev A. A. Evaluation of the in-flu- ence of the value of the dynamic range of the radio receiver on the noise immunity of receiving signals with quadrature amplitude modulation. T-Comm, 2021, vol. 15, no. 6, pp. 65-69.
10. Zhang W., Gong X., Han G. An improved ant colony algorithm for path planning in one scenic area with many spots. IEEE Access, 2017, vol. 5, pp. 13260-13269. https://doi.org/10.1155/2016/7672839
11. Xie J., Pan X. An improved rc4 stream cipher. International Conference on Computer Application and System Modeling. Taiyuan, 2010. https://doi.org/10.1109/ICCASM.2010.5620800
12. Mukhin I. E., Khmelevskaya A. V., Babanin I. G. Metodologicheskie osnovy sinteza sistem obespecheniya elektromagnitnogo dostupa sredstvami radiomonitoringa sovremennykh sistem telekommunikatsii [Methodological bases of synthesis of electromagnetic access systems by means of radio monitoring of modern telecommunication systems]. Kursk, Southwest State University Publ., 2016. 316 p.
13. Nir Y., Langley A. Chacha20 and poly1305 for ietf protocols. Available at: https://tools.ietf.org/id/draft-nir-cfrg-rfc7539bis-04.html. (accessed 05.08.2022)
14. Knyazev A. A., Khmelevskaya A. V., Lutsenko M. N., Kondrat'ev A. N. [The use of UAVs in the tasks of intellectual control and management of agricultural work]. Infokommunikatsii i kosmicheskie tekhnologii: sostoyanie, problemy i puti resheniya. Sbornik nauchnykh statei po materialam VI Vserossiiskoi nauchno-prakticheskoi konferentsii [Infocommunications and space technologies: state, problems and solutions. Collection of scientific articles based on the materials of the VI All-Russian Scientific and Practical Conference]. Kursk, Southwest State University Publ., 2022, pp. 136-140. (In Russ.)
15. Oleinik I. I., Chernomorets A. A., Koptev D. S., Zhilyakov E. G., Mukhin I. E., Zalivin A. N., Dovbnya V. G., Babanin I. G., Bondar' O. G. Metodologicheskie osnovy obnaruzheniya malorazmernykh bespilotnykh letatel'nykh apparatov na osnove kompleksnoi subpolosnoi obrabotki sverkhkorotkoimpul'snykh radiolokatsionnykh i opticheskikh signalov [Methodological bases of detection of small-sized unmanned aerial vehicles based on complex subband processing of ultrashort pulse radar and optical signals]. Kursk, Southwest State University Publ., 2021. 204 p.
16. Andronov V. G., Mukhin I. E., Babanin I. G., Sevryukov A. E., Koptev D. S., Chuev A. A. Analytical evaluation of equivalent energy loss in causal frequency selection filters in the processing of quadrature amplitude modulation signals. Journal of Physics. Conference Series, 2020, no. 1679 (3), p. 032006.
17. Babanin I. G., Andronov V. G., Koptev D. S., Nikolaenko A. I., Sevriukov A. E. The conceptual level of analysis and its place in the infological system of information and analytical support in the tasks of operational assessment of threats posed by unmanned aerial vehicles. Wave Electronics and its Application in Information and Telecommunication Systems. St. Petersburg, 2021, p. 9470577.
18. Tyapkin S. A., Mukhin I. E., Koptev D. S. Analiz sushchestvuyushchikh metodov i vozmozhnye puti povysheniya effektivnosti sistemy diagnostirovaniya dvigatelei letatel'nykh apparatov [Analysis of existing methods and possible ways to improve the efficiency of the aircraft engine diagnostics system]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computer Engineering, Information Science. Medical Instruments Engineering, 2020, vol. 10, no. 2, pp. 41-57.
19. Tyapkin S. A., Mukhin I. E., Koptev D. S. Metod sovmestnogo primeneniya pokazatelya struktury vibrosignala i izvestnykh rezul'tatov identifikatsionnykh izmerenii v zadachakh preventivnogo obnaruzheniya neispravnostei aviatsionnykh dvigatelei [Method of joint application of the vibration signal structure indicator and known results of identification measurements in the tasks of preventive fault detection of aircraft engines]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computer Engineering, Information Science. Medical Instruments Engineering, 2020, vol. 10, no. 2, pp. 58-68.
20. Mukhin I. E., Khmelevskaya A. V., Koptev D. S. Osnovy konstruirovaniya radioel- ektronnoi apparatury s uchetom obespecheniya elektromagnitnoi sovmestimosti [Fundamentals of designing radioelectronic equipment taking into account electromagnetic compatibility]. Kursk, Southwest State University Publ., 2018. 139 p.
Review
For citations:
Alena V. Khmelevskaya A.V., Sevryukov A.A., Sevryukov A.E., Babanin I.G., Babanina E.Yu. Method for Implementing Cryptographic Protection of Channels to Organize Communication via MAVLink Protocol when Control of Autonomous UAVS. Proceedings of the Southwest State University. Series: IT Management, Computer Science, Computer Engineering. Medical Equipment Engineering. 2022;12(4):122-141. (In Russ.) https://doi.org/10.21869/2223-1536-2022-12-4-122-141