Securing UAV Flight Data Using Lightweight Cryptography and Image Steganography

Na minha lista:
Detalhes bibliográficos
Publicado no:International Journal of Advanced Computer Science and Applications vol. 16, no. 5 (2025)
Autor principal: PDF
Publicado em:
Science and Information (SAI) Organization Limited
Assuntos:
Acesso em linha:Citation/Abstract
Full Text - PDF
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!

MARC

LEADER 00000nab a2200000uu 4500
001 3222641072
003 UK-CbPIL
022 |a 2158-107X 
022 |a 2156-5570 
024 7 |a 10.14569/IJACSA.2025.0160527  |2 doi 
035 |a 3222641072 
045 2 |b d20250101  |b d20251231 
100 1 |a PDF 
245 1 |a Securing UAV Flight Data Using Lightweight Cryptography and Image Steganography 
260 |b Science and Information (SAI) Organization Limited  |c 2025 
513 |a Journal Article 
520 3 |a The popularity of Unmanned Aerial Vehicles (UAVs) in various fields has been rising recently. UAV technology is being invested in by numerous industries in order to cut expenses and increase efficiency. Therefore, UAVs are predicted to become much more important in the future. As UAVs become more popular, the risk of cyberattacks on them is also growing. One type of cyberattack involves the exposure of important flight data. This, in turn, can lead to serious problems. To address this problem, a new method based on lightweight cryptography and steganography is proposed in this work. The proposed method ensures multilayer protection of important UAV flight data. This is achieved by two layers of encryption using a polyalphabetic substitution cipher and ChaCha20-Poly1305 authenticated encryption, as well as randomized least significant bit (LSB) steganography. Most importantly, through this work, a balance is kept between security and performance. Additionally, all experiments are carried out on real devices, making the proposed method more practical. The proposed method is evaluated using MSE, PSNR, and SSIM metrics. Even with a capacity of 8000 bytes, it achieves an MSE of 0.04, a PSNR of 62, and an SSIM of 0.9998. It is then compared to existing methods. The results show better practical use, stronger security, and higher overall performance. 
653 |a Encryption 
653 |a Flight 
653 |a Cryptography 
653 |a Steganography 
653 |a Security 
653 |a Multilayers 
653 |a Unmanned aerial vehicles 
653 |a Data integrity 
653 |a Wavelet transforms 
653 |a Computer science 
653 |a Experiments 
653 |a Confidentiality 
653 |a Data encryption 
653 |a Methods 
653 |a Algorithms 
653 |a Militancy 
653 |a Internet of Things 
653 |a Cybersecurity 
773 0 |t International Journal of Advanced Computer Science and Applications  |g vol. 16, no. 5 (2025) 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3222641072/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3222641072/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch