Affiliation:
1. KIRKLARELI UNIVERSITY
2. DOKUZ EYLUL UNIVERSITY, FACULTY OF ENGINEERING
Abstract
The main purpose of this article is to provide data transfer by providing secure communication with drones, which is a kind of unmanned aerial vehicle (UAV). In our study, without intervening hardware and software of the drone (most of the drones do not allow interference with their hardware and software), a security layer is added for data communication. In our study for adding this layer, Wemos D1 Mini, having wireless network module and cheap, was used. In the scope of the study, Wi-Fi modules are customized and converted into Access Point and Client forms. The message sent to the specialized modules is provided through the Mobile Application, which has been designed and implemented for this study. Thus, commands were transmitted in an encrypted form in the wireless data transmission environment. As a result, this concept has become a prototype that can be customized according to any specific drone having Wi-Fi communication.
Publisher
Deu Muhendislik Fakultesi Fen ve Muhendislik
Reference19 articles.
1. Urien, P. 2018. An Innovative Four-Quarter IoT Secure Architecture Based on Secure Element. 14th Int. Wireless Communications & Mobile Computing Conf. (IWCMC), 25-29 June, Limassol, 1074-1080, DOI: 10.1109/IWCMC.2018.8450435.
2. Kubilay, İ. A. and Kubilay, H. 2018. Drone Design for Abiding Legal Guidelines. International Conference on Science and Technology, 5-9 September, Prizren, 482-488.
3. Rodday, N. M., Schmidt, R. D. O. and Pras, A. 2016. Exploring security vulnerabilities of unmanned aerial vehicles. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 25-29 April, Istanbul, 993-994, DOI: 10.1109/NOMS.2016.7502939.
4. Verup, M. and Olin, M. 2016. Security models and exploitations in theory and practice for unmanned aerial vehicles. http://www2.compute.dtu.dk/pubdb/edoc/ imm7054.pdp (Accessed on: 07.03.2023).
5. Hartmann, K. and Giles, K. 2016. UAV Exploitation: A New Domain for Cyber Power. 8th Int. Conf. on Cyber Conflict, 31 May-03 June, Tallinn, 205-221, DOI: 10.1109/CYCON.2016.7529436.