As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
This paper describes different vulnerabilities in the infrastructure of unmanned systems. Unmanned systems and wireless communication are prone to software and hardware attacks. Security is an important issue during system design. This study shows that hardware security implementation of FPGA-based design in the unmanned system and provides a robust security design method. The use of logic encryption technique is implemented to change the value of the input signal based on the security key value. The increase in the number of bits in keys protects against different cyberattacks but it increases the complexity of the design depending on the application and the level where it is applied. This security method is implemented in the Zedboard device and is used to ensure hardware security for the application.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.