scholarly journals Hardware-Software Complex Protection of Telemetry and Telecontrol of Specialized Unmanned Aerial Vehicles

Author(s):  
Vladimir V. Mitrashchuk ◽  
Marina P. Baranova

This article discusses the problem of creating a secure communication channel with specialized UAV. This problem is very relevant today, because an unprotected communication channel can destroy the UAV or distort data received from it. To solve this problem, an exchange protocol with the ability to protect transmitted information is required the core of this protocol is an encryption algorithm, based on which the algorithms for protecting the integrity, confidentiality and availability of the transmitted data for the UAV are implemented. The structure of the protocol for the secure exchange of information was developed. The selection of the hardware platform for the implementation of the software-hardware module of the protocol has been made. The results of cryptanalysis showed the feasibility of using an encryption algorithm in the protocol. The parameters of the protocol are determined, the protocol’s configuration methodology is formulated depending on the possible data exchange channels in order to ensure the maximum permissible level of protection of the transmitted information, taking into account the characteristics of each channel. According to the results of this work, we can conclude that the proposed encryption algorithm is better resistant to cryptanalysis than other widely used algorithms

2018 ◽  
Vol 22 (2) ◽  
pp. 27-33
Author(s):  
A. V. Astafiev ◽  
T. O. Shardin

In this paper, the technology of secure data exchange based on the handshake Protocol for industrial automation systems is considered. The threats of client-server applications, on the basis of which it was concluded that the need to use and further implementation of a secure communication channel, for the implementation of secure data exchange. In the process of work, the existing methods of integration and automation of the process at industrial enterprises are analyzed. According to the results of the comparative analysis, as the integration of client and server was chosen Wordpress using plug-ins an online store WooCommerce and 1C. Were considered direct analogues of the handshake Protocol, highlighting the advantages and disadvantages of using in this application, we compare each method, as a secure communication channel has been selected the handshake Protocol, as it showed more benefits than listed counterparts. The handshake Protocol used an asymmetric RSA encryption system. The server generated a pair of keys, the public key was at the client, the private - at the server, the client identification was carried out by the public key and the control phrase, which was originally agreed by the exchange participants. If at any stage of identification the data did not match or an attempt was made to invade third parties in the information exchange, the client did not receive any data from the server. Finally, the schemes of the handshake Protocol, RSA cryptosystems and the General scheme of the implemented application are presented. This development has shown effective use and has been implemented in the enterprise for the production of furniture products.


2018 ◽  
Vol 48 (3) ◽  
pp. 84-90 ◽  
Author(s):  
E. A. Lapchenko ◽  
S. P. Isakova ◽  
T. N. Bobrova ◽  
L. A. Kolpakova

It is shown that the application of the Internet technologies is relevant in the selection of crop production technologies and the formation of a rational composition of the machine-and-tractor fl eet taking into account the conditions and production resources of a particular agricultural enterprise. The work gives a short description of the web applications, namely “ExactFarming”, “Agrivi” and “AgCommand” that provide a possibility to select technologies and technical means of soil treatment, and their functions. “ExactFarming” allows to collect and store information about temperature, precipitation and weather forecast in certain areas, keep records of information about crops and make technological maps using expert templates. “Agrivi” allows to store and provide access to weather information in the fi elds with certain crops. It has algorithms to detect and make warnings about risks related to diseases and pests, as well as provides economic calculations of crop profi tability and crop planning. “AgCommand” allows to track the position of machinery and equipment in the fi elds and provides data on the weather situation in order to plan the use of agricultural machinery in the fi elds. The web applications presented hereabove do not show relation between the technologies applied and agro-climatic features of the farm location zone. They do not take into account the phytosanitary conditions in the previous years, or the relief and contour of the fi elds while drawing up technological maps or selecting the machine-and-tractor fl eet. Siberian Physical-Technical Institute of Agrarian Problems of Siberian Federal Scientifi c Center of AgroBioTechnologies of the Russian Academy of Sciences developed a software complex PIKAT for supporting machine agrotechnologies for production of spring wheat grain at an agricultural enterprise, on the basis of which there is a plan to develop a web application that will consider all the main factors limiting the yield of cultivated crops.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2018 ◽  
Vol 1 (1) ◽  
pp. 76-93 ◽  
Author(s):  
Yang Zhang ◽  
Xuhui Wang ◽  
Yingying Shen

PurposeAs the focal point of both academic studies and business practices, the theme strategy of corporate social responsibility (CSR) arouses wide attention. However, extant studies concentrate more on the selection of the theme of CSR activities, such as the fitness between CSR activities and the core business, thus largely neglecting the consistency of the theme. The purpose of this paper is to determine whether the enterprise should adopt a consistent theme strategy or should participate in different social programs, and how do customers response to the lack of studies in different theme-consistent strategies.Design/methodology/approachIn this paper, two progressive experiments are performed. The purpose of study 1 is to examine the influence of theme consistency on consumers’ CSR association and how consumers’ attribution to corporation motivation mediates such impacts. The purpose for study 2 is to examine whether information dissemination channels and cooperation with public organization could affect the influence of theme consistency strategy.FindingsThe significant influences of theme consistency on consumer CSR association was demonstrated, and consumer’s perceived motivation of CSR was found to play the mediation role. Moreover, the moderation effect of the communication channel of CSR information was found to be important to strengthen the influence of the theme-consistent strategy.Originality/valueThis paper not only demonstrates the influence of theme consistency, but also explains how theme consistency influences consumers’ attitude and behavior. It enriches the study on the antecedent variables of consumers’ attribution to corporate motivation.


Author(s):  
David Crowe ◽  
Wasim Al-Hamdani

This paper presents a synchronous encryption key management model that does not require the sender to disclose the encryption key in order to effect decryption. This eliminates the need for key exchange mechanisms, giving the sender improved control over their keys. The retained-key model is presented as being a software application that handles the initiation of a secure communication channel between sender and receiver, and facilitates user authentication by a trusted third party—presumably, the software’s vendor. This model is not intended to replace public/private key-based mechanisms, as they serve an important role in message signing and authentication. Rather, it seeks to provide an alternative means of decrypting messages in a secure fashion while allowing the sender to avoid the need to disclose the message’s key.


Author(s):  
Anton Pavlovich Teykhrib

<p>This article discusses a hybrid distributed environment including two levels of nodes: the first level which has high quality channels between the nodes, and the second one in which the nodes are directly involved in communication and the communication is performed through the first-level nodes. For the indicated distribution scheme, the questions of selection of the best path between the first-level nodes are solved based on such communication channel characteristics as delay in packet transmission, jitter in transmission, packet loss in transmission, and choosing a method for data transmission through the selected best path: protocols of transport and network layers have been compared, and the use of network layer has been preferred.</p>


2010 ◽  
Vol 56 (1) ◽  
pp. 87-98
Author(s):  
Christopher Armstrong ◽  
Diarmuid Kavanagh ◽  
Sara Lal ◽  
Peter Rossiter

Combining Popular Game Consoles and OSGi to Investigate Autonomous In-The-Field Biomedical Data Acquisition and ManagementThe need and interest in conducting biomedical research outside the traditional laboratory is increasing. In the field testing such as in the participant's home or work environment is a growing consideration when undertaking biomedical investigation. This type of research requires at a minimum semi-autonomous computer systems that collect such data and send it back to the laboratory for processing and dissemination with the smallest amount of attendance by the participant or even the experimenter. A key aspect of supporting this type of research is the selection of the appropriate software and hardware components. These supporting systems need to be reliable, allow considerable customizability and be readily accessible but also able to be locked down. In this paper we report a set of requirements for the hardware and software for such a system. We then utilise these requirements to evaluate the use of game consoles as a hardware platform in comparison to other hardware choices. We finish by outline one particular aspect of the supporting software used to support the chosen hardware platform based on the OSGi framework.


Sign in / Sign up

Export Citation Format

Share Document