quotation:[Copy]
[Copy]
【Print page】 【Download 【PDF Full text】 View/Add CommentDownload reader Close

←Previous page|Page Next →

Back Issue    Advanced search

This Paper:Browse 370   Download 188 本文二维码信息
码上扫一扫!
4G/5G无人机指挥控制链路传输威胁与防护
姜家财,吴昊,朱宇,杨斌,郭伟,肖光龙
0
(1.西南电子技术研究所,成都 610036;2.西南交通大学 信息科学与技术学院,成都 611756)
摘要:
随着4G/5G移动通信技术被应用于无人机指挥控制(Command and Control,C2)链路,此类链路因安全保护机制不足而面临日益严峻的安全威胁。针对4G/5G无人机C2链路完整性保护缺失的弱点,在实验室环境下完成了4G/5G无人机C2链路指令篡改攻击验证实验。为了应对该威胁,提出了基于高性能认证加密的C2链路数据防护方案,并在飞腾E2000Q嵌入式环境下完成了与现有商用EEA3+EIA3组合方案的对比测试和分析。所提方案在保证安全性的同时具有更好的性能表现。
关键词:  移动通信技术  网络安全  无人机指挥控制链路  篡改攻击  认证加密
DOI:10.20079/j.issn.1001-893x.250225005
基金项目:航空科学基金(2023Z074109001)
Threats and Countermeasures for Data Transmission in 4G/5G UAV Command and Control Links
JIANG Jiacai,WU Hao,ZHU Yu,YANG Bin,GUO Wei,XIAO Guanglong
(1.Southwest China Institute of Electronic Technology,Chengdu 610036,China;2.School of Information Science & Technology,Southwest Jiaotong University,Chengdu 611756,China)
Abstract:
With the application of 4G/5G mobile communication technologies in the command and control(C2) links of unmanned aerial vehicles(UAVs),this kinds of link faces looming security threats due to inadequate protection mechanisms.Focusing on the integrity protection gap in 4G/5G-based UAV C2 links,the authors conduct tampering attack validation experiments in laboratory environments,successfully demonstrating command injection vulnerabilities.To address this threat,a high-performance authenticated encryption scheme for C2 data protection is proposed.Implemented on the Phytium E2000Q embedded platform,the solution is benchmarked against the 3GPP-standardized EEA3+EIA3 cryptographic suite.Experimental results confirm that the proposed scheme achieves superior performance metrics while maintaining equivalent security guarantees.
Key words:  mobile communication technology  cybersecurity  UAV command and control link  tampering attack  authenticated encryption