Skip to main content

SADDLE: Secure Aerial Data Delivery with Lightweight Encryption

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1230))

Included in the following conference series:

Abstract

Low-cost devices in the Internet of Things (IoT) can be integrated into Unmanned Aerial Systems (UAS) as a means of collecting remote data and forwarding to central collection points. However, sensitive data is subject to compromise, and should be protected using cryptography. In order to minimize threats to authenticity, data should be encrypted using session keys known only to participating nodes. In general, however, incorporation of capabilities required to both generate secure session keys and encrypt or decrypt sensitive data is difficult in low-cost IoT installations, due to resource and performance constraints. In this research, we implement a combined public and secret key secure data delivery system in a low-cost aerial platform, which incorporates cryptographic accelerators and required peripherals, in the Zybo Z7-10 System-on-Chip. Components are integrated using a flexible and extensible Applications Programming Interface (API) in a hardware-software design approach, and flown on a low-cost F450 ARF quad-copter drone. Resulting components consume 60% of the slice resources of the Zybo FPGA, and achieve a takeoff weight of 1.2 kg. A flight demonstration is performed, where sensitive data, collected at a remote sensor, is securely delivered to a host.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, C., Ma, F., Yan, J., De, D., Das, S.: Efficient aerial data collection with UAV in large-scale wireless sensor networks. Int. J. Distrib. Sens. Netw. 11, 286080 (2015)

    Article  Google Scholar 

  2. Kanistras, K., Martins, G., Rutherford, M.J., Valavanis, K.: A survey of unmanned aerial vehicles (UAVs) for traffic monitoring, pp. 221–234 (2013)

    Google Scholar 

  3. Kochetkova, L.: Pipeline monitoring with unmanned aerial vehicles. J. Phys. Conf. Ser. 1015, 042021 (2018)

    Article  Google Scholar 

  4. Schneier, B.: Regulating the Internet of Things. In: RSA Conference USA 2017, San Francisco, CA, 14 February 2017

    Google Scholar 

  5. Federal Information Processing Standards Publication 186-4: Digital Signature Standard (DSS), National Institute of Standards Technology (NIST), July 2013

    Google Scholar 

  6. Advanced Encryption Standard: FIPS PUB 197, 26 November 2001

    Google Scholar 

  7. Huang, H., Wu, J.: A probabilistic clustering algorithm in wireless sensor networks. In: VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, September 2005, vol. 3, pp. 1796–1798 (2005)

    Google Scholar 

  8. Polo, J., Hornero, G., Duijneveld, C., Garcia, A., Casas, O.: Design of a low-cost wireless sensor network with UAV mobile node for agricultural applications. Comput. Electron. Agric. 119, 19–32 (2015)

    Article  Google Scholar 

  9. Potter, B., Valentino, G., Yates, L., Benzing, T., Salman, A.: Environmental monitoring using a drone-enabled wireless sensor network. In: 2019 Systems and Information Engineering Design Symposium (SIEDS), pp. 1–6, April 2019

    Google Scholar 

  10. Cheon, J.H., et al.: Toward a secure drone system: flying with real-time homomorphic authenticated encryption. IEEE Access 6, 24325–24339 (2018)

    Article  Google Scholar 

  11. Ozmen, M.O., Yavuz, A.A.: Dronecrypt – an efficient cryptographic framework for small aerial drones. In: IEEE Military Communications Conference (MILCOM 2018), Los Angeles, CA, pp. 1–6 (2018)

    Google Scholar 

  12. Ozmen, M.O., Behnia, R., Yavuz, A.A.: IoD-Crypt: a lightweight cryptographic framework for Internet of Drones. arXiv arXiv:1904.06829 (2019)

  13. Rescorla, E.: Diffie-Hellman key agreement method. In: RFC 2631, June 1999

    Google Scholar 

  14. Miller, V.: Use of elliptic curves in cryptography. In: Advances in Cryptology, CRYPTO 1985, pp. 417–426 (1986)

    Google Scholar 

  15. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  16. Zhou, L., Su, C., Hu, Z., Lee, S., Seo, H.: Lightweight implementations of NIST P-256 and SM2 ECC on 8-bit resource-constraint embedded device. ACM Trans. Embed. Comput. Syst. 18(3), 23:1–23:13 (2019)

    Google Scholar 

  17. Al-Adhami, A., Ambroze, M., Stenget, I., Tomlinson, M.: A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 165–171, July 2017

    Google Scholar 

  18. Marzouqi, H., Al-Qutayri, M., Salah, K.: An FPGA implementation of NIST 256 Prime Field ECC processor. In: 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), pp. 493–496, December 2013

    Google Scholar 

  19. Rahman, M.S., Hossain, M.S., Rahat, E.H., Dipta, D.R., Faruque, H.M.R., Fattah, F.K.: Efficient hardware implementation of 256-bit ECC processor over prime field. In: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 1–6, February 2019

    Google Scholar 

  20. Sahingoz, O.K.: Large scale wireless sensor networks with multi-level dynamic key management scheme. J. Syst. Architect. 59(9), 801–807 (2013)

    Article  Google Scholar 

  21. Lu, H., Li, J., Guizani, M.: Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3), 750–761 (2014)

    Article  Google Scholar 

  22. Nadir, I., Zegeye, W.K., Moazzami, F., Astatke, Y.: Establishing symmetric pairwise-keys using public-key cryptography in wireless sensor networks (WSN). In: 2016 IEEE 7th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON), pp. 1–6, October 2016

    Google Scholar 

  23. Malathy, S., Geetha, J., Suresh, A., Priya, S.: Implementing elliptic curve cryptography with ACO-based algorithm in clustered WSN for border surveillance. In: 2018 4th International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–5, February 2018

    Google Scholar 

  24. Houssain, H., Badra, M., Al-Somani, T.F.: Hardware implementations of elliptic curve cryptography in wireless sensor networks. In: 2011 International Conference for Internet Technology and Secured Transactions, pp. 1–6, December 2011

    Google Scholar 

  25. CERG: Source code for AES, June 2016. https://cryptography.gmu.edu/athena/index.php?id=CAESAR_source_codes

  26. OpenCores (Tiny AES). https://opencores.org/projects/tiny_aes

  27. OpenCores (AES Core). https://opencores.org/projects/aes_core

  28. Visengi Hardware Software Engineering (AES). http://www.visengi.com/products/aes

  29. Salman, A., Ferozpuri, A., Homsirikamol, E., Yalla, P., Kaps, J., Gaj, K.: A scalable ECC processor implementation for high-speed and lightweight with side-channel countermeasures. In: 2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, pp. 1–8 (2017)

    Google Scholar 

  30. Salman, A., Diehl, W., Kaps, J.: A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption. In: 2017 International Conference on Field Programmable Technology (ICFPT), Melbourne, VIC, pp. 235–238 (2017)

    Google Scholar 

  31. Montgomery, P.: Modular multiplication without trial division. Math. Comput. 44, 519–521 (1985)

    Article  MathSciNet  Google Scholar 

  32. NIST: Recommendation for Key Management, Special Publication 800-57 Part 1 Rev. 4 (2016). https://www.keylength.com/en/4/

Download references

Acknowledgment

This work was funded by 4-VA, a collaborative partnership for advancing the Commonwealth of Virginia (https://4-va.org) – Spring 2019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William Diehl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Demeri, A., Diehl, W., Salman, A. (2020). SADDLE: Secure Aerial Data Delivery with Lightweight Encryption. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_17

Download citation

Publish with us

Policies and ethics