A Drone Secure Handover Architecture validated in a Software in the Loop Environment

被引:0
|
作者
Vasconcelos Filho, Enio [1 ]
Gomes, Filipe [1 ,2 ]
Monteiro, Stephane [1 ,2 ]
Severino, Ricardo [1 ,2 ]
Penna, Sergio [1 ]
Koubaa, Anis [1 ,3 ]
Tovar, Eduardo [1 ]
机构
[1] Inst Super Engn Porto, CISTER Res Ctr Real Time Embedded Comp Syst, Rua Alfredo Allen 535, P-4200135 Porto, Portugal
[2] Polytech Inst Porto, PORTIC, Porto, Portugal
[3] Prince Sultan Univ, Riyadh, Saudi Arabia
来源
12TH EASN INTERNATIONAL CONFERENCE ON "INNOVATION IN AVIATION & SPACE FOR OPENING NEW HORIZONS" | 2023年 / 2526卷
关键词
D O I
10.1088/1742-6596/2526/1/012083
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The flight and control capabilities of uncrewed aerial vehicles (UAVs) have increased significantly with recent research for civilian and commercial applications. As a result, these devices are becoming capable of flying ever greater distances, accomplishing flights beyond line of sight (BVLOS). However, given the need for safety guarantees, these flights are increasingly subject to regulations. Handover operations between controllers and the security of the exchanged data are a challenge for implementing these devices in various applications. This paper presents a secure handover architecture between control stations, using a Software in the Loop (SIL) model to validate the adopted strategies and mitigate the time between simulation and real systems implementations. This architecture is developed in two separate modules that perform the security and handover processes. Finally, we validate the proposed architecture with several drone flights on a virtual testbed.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Software Architecture Evaluation in Agile Environment
    Ahuja, Chandni
    Kaur, Parminder
    Singh, Hardeep
    SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 335 - 356
  • [22] ARCHITECTURE PROTOTYPING IN THE SOFTWARE ENGINEERING ENVIRONMENT
    BEREGI, WE
    IBM SYSTEMS JOURNAL, 1984, 23 (01) : 4 - 18
  • [23] A distributed intrusion detection approach for secure software architecture
    Inverardi, P
    Mostarda, L
    SOFTWARE ARCHITECTURE, PROCEEDINGS, 2005, 3527 : 168 - 184
  • [24] VMCrypt - Modular Software Architecture for Scalable Secure Computation
    Malka, Lior
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 715 - 724
  • [25] Secure Vehicle Software Updates: Requirements for a Reference Architecture
    Strandberg, Kim
    Arnljung, Ulf
    Olovsson, Tomas
    Oka, Dennis Kengo
    2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
  • [26] (B)LOCKBOX - Secure Software Architecture with Blockchain Verification
    Heiland, Erik
    Hillmann, Peter
    36TH ANNUAL EUROPEAN SIMULATION AND MODELLING CONFERENCE, ESM 2022, 2022, : 90 - 93
  • [27] Secure interface architecture for the software defined system on wafer
    Li, Peijie
    Shen, Jianliang
    Guo, Wei
    Cao, Zhipeng
    Mei, Bo
    Tongxin Xuebao/Journal on Communications, 2024, 45 (10): : 41 - 54
  • [28] A Resilient and Secure Software Platform and Architecture for Distributed Spacecraft
    Otte, William R.
    Dubey, Abhishek
    Karsai, Gabor
    SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VII, 2014, 9085
  • [29] Software Architecture of a Secure Multimedia System Using a Multicore SoC and Software Virtualization
    Kondol, Hiroyuki
    Yamamoto, Osamu
    Otani, Sugako
    Sugai, Naoto
    Shimizu, Toru
    2009 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2009, : 217 - +
  • [30] Software requirements and architecture modeling for evolving non-secure applications into secure applications
    Shin, Michael E.
    Goma, Hassan
    SCIENCE OF COMPUTER PROGRAMMING, 2007, 66 (01) : 60 - 70