최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.25 no.10, 2021년, pp.1353 - 1358
김병국 (Department of Computer Software, Induk University) , 홍성화 (Division of Navigational Information System, Mokpo National Maritime University) , 강지헌 (Department of Software, Duksung Women's University)
IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By W...
MAVLink [Internet]. Available: https://mavlink.io.
J. Y. Yoon, H. J. Lee, and K. J. Park, "UAV System Security Enhancement in Wi-Fi Communication Between UAV and GCS," The Journal of Korean Institute of Communications and Information Sciences, vol. 45, no. 4, pp. 686-690, Apr. 2020.
Y. M. Kwon, J. Yu, B. M. Cho, Y. S. Eun, and K. J. Park, "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles," IEEE Access, vol. 6, pp. 43203-43212, 2018.
J. Y. Yoon, H. J. Lee, and K. J. Park, "Security enhancement in wi-fi communication between UAV and GCS," in Proc. KICS ICC 2019, pp. 400-401, Jun. 2019.
J. M. Yu, J. Y. Yoon, and K. J. Park, "Risk analysis of UAV and GCS for network attacks," Journal of KIISE, vol. 37, no. 1, pp. 29-37, Jan. 2019.
A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, "Cyber security threat analysis and modeling of an unmanned aerial vehicle system," in Procedding of 2012 IEEE Conf. Technol. for Homeland Secur. (HST), Waltham, MA, USA, Nov. 2012.
S. H. Moon, M. W. Kim, and T. K. Kwon, "The trend of light cryptographic methods for IoT communication environments," The Journal of Korean Institute of Communication Sciences, vol. 33, no. 3, pp. 88-86, Feb., 2016.
S. M. Cho and S. H. Seo, "The current status of cryptographic methods for drone security," Korea Institute of Information Security And Cryptology, vol. 30, no. 2, pp. 11-19, Apr. 2020.
P. Jindal and B. Singh, "A Survey on RC4 Stream Cipher," International Journal of Computer Network and Information Security, vol. 7, pp. 37-45, Jun. 2015.
K. H. Lee, "A Modulo Arithmetic Technique for RC4 Hardware Design," Journal of the Institute of Electronics and Information Engineers, vol. 55, no. 7, pp. 119-124, Jul. 2018.
E. J. Jung, S. H. Koh, Y. S. Lee, and Y. S. Kim, "Guided Missile Assembly Test Set using Encryption AES Rijndael Algorithm," Journal of Advanced Navigation Technology, vol. 23, no. 5, pp. 339-344, Oct. 2019.
M. N. Islam, M. Mia, M. Chowdhury, and M. A. Matin, "Effect of security increment to symmetric data encryption through AES methodology," in Proceeding of Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket: Thailand, pp. 291-294, 2008.
QGroundControl [Internet]. Available: http://qgroundcontrol.com/.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.