13.08.2018 Views

[Studies in Computational Intelligence 481] Artur Babiarz, Robert Bieda, Karol Jędrasiak, Aleksander Nawrat (auth.), Aleksander Nawrat, Zygmunt Kuś (eds.) - Vision Based Systemsfor UAV Applications (2013, Sprin

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Dedicated Wireless Communication Device for Group of Unmanned Vehicles 251<br />

Fig. 3 The m<strong>in</strong>iature dedicated secure radio communication device described <strong>in</strong> the article<br />

compared to the polish smallest co<strong>in</strong> and the ruler <strong>in</strong> cm<br />

The send<strong>in</strong>g frame starts with preamble consist<strong>in</strong>g of six bytes with a same<br />

hexadecimal value 0xAA. The value is used for receiver and sender devices synchronization.<br />

After preamble there are two bytes with values 0xD3 and 0x91<br />

signaliz<strong>in</strong>g the start of the data section. Besides it, those bytes are also used for bit<br />

synchronization of the receiver.<br />

After the synchronization word there is a s<strong>in</strong>gle byte specify<strong>in</strong>g the number of<br />

data bytes <strong>in</strong> the frame. Allowed values are from 1 to 255. After described byte<br />

there is a sequence of data bytes. Length of the sequence is equal to the value of<br />

the data number byte.<br />

There are no control sums or mechanisms of bleach<strong>in</strong>g the data at the physical<br />

layer. Resignation of such mechanisms is due to implementation at the communication<br />

layer cryptographic algorithms which naturally hide all the feature of the<br />

data and detect damaged or erroneous packets.<br />

5 Data Encryption<br />

In order to ma<strong>in</strong>ta<strong>in</strong> the confidentiality of the data transmitted between devices,<br />

AES encryption algorithm is used. It enables encryption and decryption the data<br />

blocks with length of 16 bytes. The key may have 16, 24 or 32 bytes (128, 192,<br />

256 bits). Along with the encryption algorithm the hash function and a protocol of<br />

exchang<strong>in</strong>g keys is ued.<br />

The encryption algorithm itself does not describe how the amount of data of any<br />

length is to be converted to cipher text – it only describes the transformation of a<br />

s<strong>in</strong>gle block. Therefore, the algorithm must be used <strong>in</strong> one of cipher block modes of<br />

operation. Encryption mode used is CTR (Counter) mode. This mode is characterized

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!