<span lang="EN-US">Over recent years, drones are increasingly being used not only for military tasks only, but also for civilian tasks too, such as environment and traffic monitoring, delivery services, and aerial surveys. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps to cipher payload data to improve security network transfer of radio technical commission for maritime services (RTCM) messages over (NTRIP) communication protocol. By using a proposed key generation method which is based on a 1d logistic map to produce a flight session key for a drone with a flight plan, and then records the flight session key and the drone's flight plan in a central database that can be accessed. The proposed system is superior to other similar systems in terms of security and performance, according to the review.</span>
The Unmanned Aerial Vehicle (UAV) (sometimes known as a ""drone"") is used in a variety of fields. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps is required. By using a proposed key generation method which is based on a 1d Logistic chaotic map to produce a flight session key for a drone with a flight plan, and then records the flight session key and the drone’s flight plan in a central database that can be accessed. Finally, while the drone is flying, a GCS checks authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone by any flight session, and the drone after which uses salsa20 lightweight to cipher payload data to improve security Network Transfer of RTCM Messages over Internet Protocol Protocol (NTRIP) communication protocol and send it to GCS, and at last, a GCS verifies authentication of the current flight session based on the on flight session key and its flight plan as the message authentication code key to authenticate the drone. The proposed system is superior to other similar systems in terms of security and performance, according to the review.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.