Comparison of Encrypted Image Transfer Approaches That Provide Secure Video Transfer for UAV Systems

  • Ebrar Şahin NDU Hezarfen ASTIN
  • Ömer Çetin National Defense University
Keywords: Naive Algorithm, Selective Algorithm, Pure Permutation, Zigzag Permutation, Video Encryption, Security

Abstract

Today, Unmanned Aerial Vehicles (UAVs) become one of the leading technologies that are widely used for different purposes. Even though UAV systems are platform systems containing different hardware for a specific task, almost all UAV systems transmit real-time images to ground control stations (GCS). In this study it is aimed to review the methods included in the literature to ensure safe video transmission between UAV platforms and GCS and to compare their use in UAV systems by testing them on a scenario. Naive, Pure Permutation, Zigzag Permutation and Selective algorithm approaches that are among the widely used video encryption algorithms in the literature is selected as exemplary structures in this study, both because they need relatively low processing power and because they may be suitable approaches to real-time needs on mobile platforms.Within the scope of the study, a total of six performance criteria is determined and the algorithms are evaluated separately according to the performance criteria. As a result of the study, the most suitable solution for safe video transmission between UAV platforms and GCS is presented in a comparative perspective. he Selective Algorithm is selected among 4 methods examined as it is necessary to ensure the security of real-time image transfer in UAV systems as well as the fast communication between the UAV and GCS.

Published
2021-07-30
How to Cite
[1]
E. Şahin and Ömer Çetin, “Comparison of Encrypted Image Transfer Approaches That Provide Secure Video Transfer for UAV Systems”, JAST, vol. 14, no. 2, pp. 169-176, Jul. 2021.
Section
Articles