Font Size: a A A

Research On Security Protection Of Key Modules Of UAV Based On TEE

Posted on:2023-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:S H ChenFull Text:PDF
GTID:2532306908953579Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the widespread application of UAVs,whether it is in the military field or in the civil field,a single UAV can no longer meet the needs of today’s society for UAV applications.An important trend in the development of UAV applications,such as clustered UAV combat platforms in the military field.Clustered UAVs have a complex communication network,which involves not only conventional UAV and ground station communication,but also UAV and UAV communication,and communication between UAVs and other sensor networks.On the one hand,such a huge and open communication network is vulnerable to the destruction of information transmission and data tampering by criminals or malicious third parties.On the other hand,because the UAV system is a kind of embedded system,the system has the attributes of small size and weak computing power,so the software and hardware design of the UAV system focuses on the functional requirements of the UAV,which makes the T\security performance is weak,which will lead to many inevitable security loopholes in the software and hardware of the drone.Therefore,attackers can use open networks and exploit the vulnerabilities of UAVs in software and hardware to make UAVs vulnerable to security threats.Through the study of a large number of cases of drones suffering from security threats,it is found that no matter what means the attacker uses to intrude the drone,it is essentially destroying the key modules inside the drone,so as to control or destroy the drone.For example,the attacker uses GPS spoofing to attack the navigation module of the drone.Therefore,it is necessary to pay attention to the safety of the key modules of the UAV,because this module will directly affect the safety of the entire UAV.Therefore,the main work of this thesis on the research on the security protection of UAV key modules is as follows:1)This thesis designs and implements a TEE-based UAV key module security protection method to protect the security of UAV key modules from the perspective of integrity.At the same time,in order to make up for the lack of UAV hardware computer capability,this method introduces an on-board computer to complete the research on the safety protection of UAV key modules on the on-board computer.2)The introduction of the airborne computer brings about the security problem of the communication between the UAV flight control and the airborne computer.In order to solve this problem,this thesis designs and implements a secure communication protocol between the UAV flight control and the airborne computer.This protocol protects the communication data from the perspective of confidentiality,thereby protecting the communication security between the UAV flight control and the onboard computer.3)This thesis designs and implements a safety protection prototype system for key UAV modules,which includes the specific functions designed and implemented in 1)and 2),and is deployed in one of the pixhack V3 open source flight control and the hardware platform based on the ARM Cortex A7 architecture.superior.In this thesis,the performance of the prototype system is tested,and the experiments show that the prototype system is practical on the premise of ensuring the safe operation of the UAV and meeting the real-time requirements of the UAV.
Keywords/Search Tags:UAV flight control, TEE, key module, airborne computer
PDF Full Text Request
Related items