Secure Handshake Mechanism for Autonomous Flying Agents Using Robust Cryptosystem

06/19/2019
by   Chandra Kanth Nagesh, et al.
0

The autonomous flying agents in a Network-centric environment and brings out various security threats and various techniques of Cryptography. Primary Focus is on study and implementation of how cryptographic algorithms can be effectively be used in a warfare scenario. The data security is the utmost key factor for the protection of data in such environments. The paper proposes mechanisms secured data transmission from the command center (which can be the sending flying agent) to shooter target. The command center and shooter target have a unique set of encryption and decryption key which are created randomly by calibrating the security level at run time. In the beginning, the encryption key used for encrypting data is received from a shooter target when the communication is authenticated through UDP sockets. The encrypted data is sent to the shooter target with the signed signature and command center's encryption key. The encrypted data and signature are then decrypted and verified respectively at the shooter target. The time analysis is performed and observed inputs are provided to the command center.

READ FULL TEXT
research
10/17/2022

Towards Provably Secure Encrypted Control Using Homomorphic Encryption

Encrypted control is a promising method for the secure outsourcing of co...
research
12/19/2021

Using data compression and randomization to build an unconditionally secure short key cipher

We consider the problem of constructing an unconditionally secure cipher...
research
07/20/2018

Multivariate Public Key Cryptography and Digital Signature

In this paper, algorithms for multivariate public key cryptography and d...
research
06/17/2020

MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree

A key challenge for cybersecurity defense is to detect the encryption Re...
research
11/28/2017

Quantum Search on Encrypted Data Based on Quantum Homomorphic Encryption

Here we propose a quantum search protocols on ciphered superposition sta...
research
08/30/2022

AuthROS: Secure Data Sharing Among Robot Operating Systems Based on Ethereum

Robot Operating System (ROS) has brought the excellent potential for aut...
research
11/01/2020

A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm

With meteoric developments in communication systems and data storage tec...

Please sign up or login with your details

Forgot password? Click here to reset