On the Power Consumption of Cryptographic Processors in Civil Microdrones
Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek
2015
Abstract
In this paper we analyze the security requirements of civil microdrones and propose a hardware architecture to meet these requirements. While hardware solutions are usually used to accelerate cryptographic operations and reduce their power consumption, we show that the latter aspect needs to be reviewed in the context of civil drones. Specifcally, adding cryptgraphic hardware to a flying device increases its weight and, thus, the power needed to fly this device. Depending on the relative weight of the added cryptographic processor, the computational power advantage of the hardware solution may be undone by the additional hadrware weight. This aspect is analyzed for the proposed hardware solution.
References
- Bicakci, K. and Tavli, B. (2009). Denial-of-service attacks and countermeasures in ieee 802.11 wireless networks. Computer Standards & Interfaces, 31(5):931- 941.
- Chiu, C. and Lo, C. (2011). Vision-only automatic flight control for small uavs. Vehicular Technology, IEEE Transactions on, 60(6):2425-2437.
- Daemen, J. and Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. SpringerVerlag New York Inc.
- Dierks, T. and Jagannathan, S. (2010). Output feedback control of a quadrotor uav using neural networks. Neural Networks, IEEE Transactions on, 21(1):50- 66.
- Gancet, J., Hattenberger, G., Alami, R., and Lacroix, S. (2005). Task planning and control for a multi-uav system: architecture and algorithms. In Intelligent Robots and Systems, 2005.(IROS 2005). 2005 IEEE/RSJ International Conference on, pages 1017-1022. Ieee.
- Hoffmann, G., Rajnarayan, D., Waslander, S., Dostal, D., Jang, J., and Tomlin, C. (2004). The stanford testbed of autonomous rotorcraft for multi agent control (starmac). In Digital Avionics Systems Conference, 2004. DASC 04. The 23rd, volume 2, pages 12-E. Ieee.
- How, J., Bethke, B., Frank, A., Dale, D., and Vian, J. (2008). Real-time indoor autonomous vehicle test environment. Control Systems Magazine, IEEE, 28(2):51-64.
- Katz, J. and Lindell, Y. (2008). Introduction to modern cryptography. Chapman & Hall.
- Minguez, J. and Montano, L. (2004). Nearness diagram (nd) navigation: collision avoidance in troublesome scenarios. Robotics and Automation, IEEE Transactions on, 20(1):45-59.
- NIST (1985). American national standard for financial institution key management (wholesale). Available at http://csrc.nist.gov/publications/fips/.
- Pelechrinis, K., Iliofotou, M., and Krishnamurthy, V. (2011). Denial of service attacks in wireless networks: The case of jammers. Communications Surveys & Tutorials, IEEE, (13):245-257.
- Quaritsch, M., Stojanovski, E., Bettstetter, C., Friedrich, G., Hellwagner, H., Rinner, B., Hofbaur, M., and Shah, M. (2008). Collaborative microdrones: applications and research challenges. In Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, page 38. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
- Voos, H. (2006). Nonlinear state-dependent riccati equation control of a quadrotor uav. In Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control, 2006 IEEE, pages 2547-2552. IEEE.
- Yuan, C., Recktenwald, F., and Mallot, H. (2009). Visual steering of uav in unknown environments. In Intelligent Robots and Systems, 2009. IROS 2009. IEEE/RSJ International Conference on, pages 3906- 3911. IEEE.
- Zsedrovits, T., Zarandy, A., Vanek, B., Peni, T., Bokor, J., and Roska, T. (2011). Collision avoidance for uav using visual detection. In Circuits and Systems (ISCAS), 2011 IEEE International Symposium on, pages 2173- 2176. IEEE.
Paper Citation
in Harvard Style
Shoufan A., Alnoon H. and Baek J. (2015). On the Power Consumption of Cryptographic Processors in Civil Microdrones . In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 283-290. DOI: 10.5220/0005273402830290
in Bibtex Style
@conference{icissp15,
author={Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek},
title={On the Power Consumption of Cryptographic Processors in Civil Microdrones},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={283-290},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005273402830290},
isbn={978-989-758-081-9},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - On the Power Consumption of Cryptographic Processors in Civil Microdrones
SN - 978-989-758-081-9
AU - Shoufan A.
AU - Alnoon H.
AU - Baek J.
PY - 2015
SP - 283
EP - 290
DO - 10.5220/0005273402830290