DOI QR코드

DOI QR Code

안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations

  • Kim, Byoung-Kug (Department of Computer Software, Induk University) ;
  • Hong, Sung-Hwa (Division of Navigational Information System, Mokpo National Maritime University) ;
  • Kang, Jiheon (Department of Software, Duksung Women's University)
  • 투고 : 2021.07.15
  • 심사 : 2021.08.09
  • 발행 : 2021.10.31

초록

IoT(Internet of Things) 기술은 통신, 마이크로 프로세서 그리고 임베디드 소프트웨어 기술의 발전과 융합으로 인해 탄생 되었다. 그에 따른 응용 중 하나로 UAV(Unmanned Aerial Vehicle, 무인 항공기) 시스템에도 적용되고 있다. 운용상 유인용 항공기(manned aircraft)는 지상에 있는 관제 시스템을 통해 운항의 지시를 받아, 조종사가 직접 비행 기체를 제어하는 방식으로 운영되지만, UAV는 GCS(Ground Control System, 지상 제어시스템)를 통해 직접 비행 제어를 받는다. 따라서 UAV와 GCS 간의 통신을 위한 프로토콜로 개방형인 MAVLink (Macro Air Vehicle Link)가 주로 사용이 되고 있으나, 범용이고 공개적이다 보니 일부구간에서 제삼자에 의해 쉽게 노출되어 비행체의 상태 및 기타 제어 정보 등의 정보 보안에 취약하다. 본 제안은 UAV를 안전하게 운영하기 위한 GCS 내 통신메시지의 암호화 적용 방안을 제시한다.

IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

키워드

참고문헌

  1. MAVLink [Internet]. Available: https://mavlink.io.
  2. J. Y. Yoon, H. J. Lee, and K. J. Park, "UAV System Security Enhancement in Wi-Fi Communication Between UAV and GCS," The Journal of Korean Institute of Communications and Information Sciences, vol. 45, no. 4, pp. 686-690, Apr. 2020. https://doi.org/10.7840/kics.2020.45.4.686
  3. Y. M. Kwon, J. Yu, B. M. Cho, Y. S. Eun, and K. J. Park, "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles," IEEE Access, vol. 6, pp. 43203-43212, 2018. https://doi.org/10.1109/access.2018.2863237
  4. J. Y. Yoon, H. J. Lee, and K. J. Park, "Security enhancement in wi-fi communication between UAV and GCS," in Proc. KICS ICC 2019, pp. 400-401, Jun. 2019.
  5. J. M. Yu, J. Y. Yoon, and K. J. Park, "Risk analysis of UAV and GCS for network attacks," Journal of KIISE, vol. 37, no. 1, pp. 29-37, Jan. 2019.
  6. A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, "Cyber security threat analysis and modeling of an unmanned aerial vehicle system," in Procedding of 2012 IEEE Conf. Technol. for Homeland Secur. (HST), Waltham, MA, USA, Nov. 2012.
  7. S. H. Moon, M. W. Kim, and T. K. Kwon, "The trend of light cryptographic methods for IoT communication environments," The Journal of Korean Institute of Communication Sciences, vol. 33, no. 3, pp. 88-86, Feb., 2016.
  8. S. M. Cho and S. H. Seo, "The current status of cryptographic methods for drone security," Korea Institute of Information Security And Cryptology, vol. 30, no. 2, pp. 11-19, Apr. 2020.
  9. P. Jindal and B. Singh, "A Survey on RC4 Stream Cipher," International Journal of Computer Network and Information Security, vol. 7, pp. 37-45, Jun. 2015.
  10. K. H. Lee, "A Modulo Arithmetic Technique for RC4 Hardware Design," Journal of the Institute of Electronics and Information Engineers, vol. 55, no. 7, pp. 119-124, Jul. 2018. https://doi.org/10.5573/ieie.2018.55.7.119
  11. E. J. Jung, S. H. Koh, Y. S. Lee, and Y. S. Kim, "Guided Missile Assembly Test Set using Encryption AES Rijndael Algorithm," Journal of Advanced Navigation Technology, vol. 23, no. 5, pp. 339-344, Oct. 2019.
  12. M. N. Islam, M. Mia, M. Chowdhury, and M. A. Matin, "Effect of security increment to symmetric data encryption through AES methodology," in Proceeding of Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket: Thailand, pp. 291-294, 2008.
  13. QGroundControl [Internet]. Available: http://qgroundcontrol.com/.