Table 2: A HW-SW Comparison of the Image Coding (Encryption and Authentication).
Compared Value Software Hardware Unit
Time needed to encode one JPEG frame 100 14.4 msec
Time needed to encrypte and authenticate one JPEG frame 209.6 1.54 msec
Time needed to encode, encrypt and authenticate one JPEG frame 309.6 15.9 msec
Throughput 3.2 62.8 fps
Measured prone power consumption while hovering 220 223.36 watt
Estimated flight time under maximum possible throughput 9.03 8.89 minute
as expected a clear throughput advantage when com-
pared to a similar software implementation. In con-
trast, the power consumption of the hardware solu-
tion exceeds that of the software alternative due to the
extra weight of the FPGA board. It can be assumed
that this aspect gets more relevant for low-weight mi-
crodrones that need to meet security requirements.
Specifically, such vehicles have very limited com-
putational power, as a rule, and are expected to fail
to support cryptographic functions. While enhanc-
ing these vehicles with cryptoprocessors can solve the
performance issue, the relative weight of the addi-
tional hardware can significantly worsen the power
consumption of the device and thus its flight time.
The specification and the modeling of this aspect is an
interesting research question that will be addressed in
future work.
REFERENCES
ANG-UAVP. Next generation universal aerial video plat-
form. http://ng.uavp.ch/moin/FrontPage.
Bicakci, K. and Tavli, B. (2009). Denial-of-service attacks
and countermeasures in ieee 802.11 wireless net-
works. Computer Standards & Interfaces, 31(5):931–
941.
Chiu, C. and Lo, C. (2011). Vision-only automatic flight
control for small uavs. Vehicular Technology, IEEE
Transactions on, 60(6):2425–2437.
Daemen, J. and Rijmen, V. (2002). The design of Rijndael:
AES–the advanced encryption standard. Springer-
Verlag New York Inc.
Dierks, T. and Jagannathan, S. (2010). Output feedback
control of a quadrotor uav using neural networks.
Neural Networks, IEEE Transactions on, 21(1):50–
66.
Gancet, J., Hattenberger, G., Alami, R., and Lacroix, S.
(2005). Task planning and control for a multi-uav sys-
tem: architecture and algorithms. In Intelligent Robots
and Systems, 2005.(IROS 2005). 2005 IEEE/RSJ In-
ternational Conference on, pages 1017–1022. Ieee.
Hoffmann, G., Rajnarayan, D., Waslander, S., Dostal, D.,
Jang, J., and Tomlin, C. (2004). The stanford testbed
of autonomous rotorcraft for multi agent control (star-
mac). In Digital Avionics Systems Conference, 2004.
DASC 04. The 23rd, volume 2, pages 12–E. Ieee.
How, J., Bethke, B., Frank, A., Dale, D., and Vian,
J. (2008). Real-time indoor autonomous vehicle
test environment. Control Systems Magazine, IEEE,
28(2):51–64.
Katz, J. and Lindell, Y. (2008). Introduction to modern
cryptography. Chapman & Hall.
Krepa, M. Jpeg encoder, project, mkjpeg.
http://opencores.org/.
Minguez, J. and Montano, L. (2004). Nearness diagram
(nd) navigation: collision avoidance in troublesome
scenarios. Robotics and Automation, IEEE Transac-
tions on, 20(1):45–59.
Mller, M. ecalc, on-line calculator for electric driven rc
models. http://www.ecalc.ch/.
NIST (1985). American national standard for financial in-
stitution key management (wholesale). Available at
http://csrc.nist.gov/publications/fips/.
Pelechrinis, K., Iliofotou, M., and Krishnamurthy, V.
(2011). Denial of service attacks in wireless networks:
The case of jammers. Communications Surveys & Tu-
torials, IEEE, (13):245–257.
Quaritsch, M., Stojanovski, E., Bettstetter, C., Friedrich, G.,
Hellwagner, H., Rinner, B., Hofbaur, M., and Shah,
M. (2008). Collaborative microdrones: applications
and research challenges. In Proceedings of the 2nd In-
ternational Conference on Autonomic Computing and
Communication Systems, page 38. ICST (Institute for
Computer Sciences, Social-Informatics and Telecom-
munications Engineering).
Voos, H. (2006). Nonlinear state-dependent riccati equation
control of a quadrotor uav. In Computer Aided Con-
trol System Design, 2006 IEEE International Con-
ference on Control Applications, 2006 IEEE Interna-
tional Symposium on Intelligent Control, 2006 IEEE,
pages 2547–2552. IEEE.
Yuan, C., Recktenwald, F., and Mallot, H. (2009). Vi-
sual steering of uav in unknown environments. In
Intelligent Robots and Systems, 2009. IROS 2009.
IEEE/RSJ International Conference on, pages 3906–
3911. IEEE.
Zsedrovits, T., Zarandy, A., Vanek, B., Peni, T., Bokor, J.,
and Roska, T. (2011). Collision avoidance for uav us-
ing visual detection. In Circuits and Systems (ISCAS),
2011 IEEE International Symposium on, pages 2173–
2176. IEEE.
ICISSP2015-1stInternationalConferenceonInformationSystemsSecurityandPrivacy
290