Abstract
Low-cost devices in the Internet of Things (IoT) can be integrated into Unmanned Aerial Systems (UAS) as a means of collecting remote data and forwarding to central collection points. However, sensitive data is subject to compromise, and should be protected using cryptography. In order to minimize threats to authenticity, data should be encrypted using session keys known only to participating nodes. In general, however, incorporation of capabilities required to both generate secure session keys and encrypt or decrypt sensitive data is difficult in low-cost IoT installations, due to resource and performance constraints. In this research, we implement a combined public and secret key secure data delivery system in a low-cost aerial platform, which incorporates cryptographic accelerators and required peripherals, in the Zybo Z7-10 System-on-Chip. Components are integrated using a flexible and extensible Applications Programming Interface (API) in a hardware-software design approach, and flown on a low-cost F450 ARF quad-copter drone. Resulting components consume 60% of the slice resources of the Zybo FPGA, and achieve a takeoff weight of 1.2 kg. A flight demonstration is performed, where sensitive data, collected at a remote sensor, is securely delivered to a host.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, C., Ma, F., Yan, J., De, D., Das, S.: Efficient aerial data collection with UAV in large-scale wireless sensor networks. Int. J. Distrib. Sens. Netw. 11, 286080 (2015)
Kanistras, K., Martins, G., Rutherford, M.J., Valavanis, K.: A survey of unmanned aerial vehicles (UAVs) for traffic monitoring, pp. 221–234 (2013)
Kochetkova, L.: Pipeline monitoring with unmanned aerial vehicles. J. Phys. Conf. Ser. 1015, 042021 (2018)
Schneier, B.: Regulating the Internet of Things. In: RSA Conference USA 2017, San Francisco, CA, 14 February 2017
Federal Information Processing Standards Publication 186-4: Digital Signature Standard (DSS), National Institute of Standards Technology (NIST), July 2013
Advanced Encryption Standard: FIPS PUB 197, 26 November 2001
Huang, H., Wu, J.: A probabilistic clustering algorithm in wireless sensor networks. In: VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, September 2005, vol. 3, pp. 1796–1798 (2005)
Polo, J., Hornero, G., Duijneveld, C., Garcia, A., Casas, O.: Design of a low-cost wireless sensor network with UAV mobile node for agricultural applications. Comput. Electron. Agric. 119, 19–32 (2015)
Potter, B., Valentino, G., Yates, L., Benzing, T., Salman, A.: Environmental monitoring using a drone-enabled wireless sensor network. In: 2019 Systems and Information Engineering Design Symposium (SIEDS), pp. 1–6, April 2019
Cheon, J.H., et al.: Toward a secure drone system: flying with real-time homomorphic authenticated encryption. IEEE Access 6, 24325–24339 (2018)
Ozmen, M.O., Yavuz, A.A.: Dronecrypt – an efficient cryptographic framework for small aerial drones. In: IEEE Military Communications Conference (MILCOM 2018), Los Angeles, CA, pp. 1–6 (2018)
Ozmen, M.O., Behnia, R., Yavuz, A.A.: IoD-Crypt: a lightweight cryptographic framework for Internet of Drones. arXiv arXiv:1904.06829 (2019)
Rescorla, E.: Diffie-Hellman key agreement method. In: RFC 2631, June 1999
Miller, V.: Use of elliptic curves in cryptography. In: Advances in Cryptology, CRYPTO 1985, pp. 417–426 (1986)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)
Zhou, L., Su, C., Hu, Z., Lee, S., Seo, H.: Lightweight implementations of NIST P-256 and SM2 ECC on 8-bit resource-constraint embedded device. ACM Trans. Embed. Comput. Syst. 18(3), 23:1–23:13 (2019)
Al-Adhami, A., Ambroze, M., Stenget, I., Tomlinson, M.: A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 165–171, July 2017
Marzouqi, H., Al-Qutayri, M., Salah, K.: An FPGA implementation of NIST 256 Prime Field ECC processor. In: 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), pp. 493–496, December 2013
Rahman, M.S., Hossain, M.S., Rahat, E.H., Dipta, D.R., Faruque, H.M.R., Fattah, F.K.: Efficient hardware implementation of 256-bit ECC processor over prime field. In: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 1–6, February 2019
Sahingoz, O.K.: Large scale wireless sensor networks with multi-level dynamic key management scheme. J. Syst. Architect. 59(9), 801–807 (2013)
Lu, H., Li, J., Guizani, M.: Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3), 750–761 (2014)
Nadir, I., Zegeye, W.K., Moazzami, F., Astatke, Y.: Establishing symmetric pairwise-keys using public-key cryptography in wireless sensor networks (WSN). In: 2016 IEEE 7th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON), pp. 1–6, October 2016
Malathy, S., Geetha, J., Suresh, A., Priya, S.: Implementing elliptic curve cryptography with ACO-based algorithm in clustered WSN for border surveillance. In: 2018 4th International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–5, February 2018
Houssain, H., Badra, M., Al-Somani, T.F.: Hardware implementations of elliptic curve cryptography in wireless sensor networks. In: 2011 International Conference for Internet Technology and Secured Transactions, pp. 1–6, December 2011
CERG: Source code for AES, June 2016. https://cryptography.gmu.edu/athena/index.php?id=CAESAR_source_codes
OpenCores (Tiny AES). https://opencores.org/projects/tiny_aes
OpenCores (AES Core). https://opencores.org/projects/aes_core
Visengi Hardware Software Engineering (AES). http://www.visengi.com/products/aes
Salman, A., Ferozpuri, A., Homsirikamol, E., Yalla, P., Kaps, J., Gaj, K.: A scalable ECC processor implementation for high-speed and lightweight with side-channel countermeasures. In: 2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, pp. 1–8 (2017)
Salman, A., Diehl, W., Kaps, J.: A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption. In: 2017 International Conference on Field Programmable Technology (ICFPT), Melbourne, VIC, pp. 235–238 (2017)
Montgomery, P.: Modular multiplication without trial division. Math. Comput. 44, 519–521 (1985)
NIST: Recommendation for Key Management, Special Publication 800-57 Part 1 Rev. 4 (2016). https://www.keylength.com/en/4/
Acknowledgment
This work was funded by 4-VA, a collaborative partnership for advancing the Commonwealth of Virginia (https://4-va.org) – Spring 2019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Demeri, A., Diehl, W., Salman, A. (2020). SADDLE: Secure Aerial Data Delivery with Lightweight Encryption. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)