skip to main content
10.1145/3603273.3632221acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaaiaConference Proceedingsconference-collections
research-article

ECC-based Secure Communication Platform for Unmanned Systems

Authors Info & Claims
Published:09 January 2024Publication History

ABSTRACT

With the rapid development of information technology, information security has become particularly important in the field of communication. To address the limited resources and low computing power of traditional edge platforms, in this paper, an Elliptic Curve Cryptography-based secure communication platform for unmanned systems was developed. Firstly, the platform adopts the Elliptic Curve Cryptography algorithm as the underlying computing support for secure communication. Besides, in its hardware implementation, multi-level pipeline and three-level parallel computing were adopted to achieve high-speed operation of its critical computing. Secondly, in order to increase the flexibility and programmability of the system, for computing on the secure communication protocol layer, the Linux operating system deployed on ZYNQ-7000 SoC is used to achieve programmability and hardware calls to the secure communication protocol. The results show that the ZYNQ-based secure communication platform can complete a dedicated protocol key negotiation in 12.6ms, which is significantly faster than the 28.8ms computing speed based on the same CPU (dual core ARM Cortex-A9) software implementation. It can improve the speed of secure communication while ensuring the flexibility and programmability of unmanned system applications.

References

  1. Buchovecká S, Lórencz R, Bucek J, Lightweight Authentication and Secure Communication Suitable for IoT Devices[C]//ICISSP. 2020: 75-83.Google ScholarGoogle Scholar
  2. Victor S Miller. Use of elliptic curves in cryptography. In Advances in CryptologyłCRYPTO85 Proceedings, pages 417– 426. Springer, 1985.Google ScholarGoogle Scholar
  3. Neal Koblitz. Elliptic curve cryptosystems. Mathematics of computation, 48(177):203–209, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  4. Liu Z, Liu D, Zou X. An efficient and flexible hardware implementation of the dual-field elliptic curve cryptographic processor[J]. IEEE Transactions on Industrial Electronics, 2016, 64(3): 2353-2362.Google ScholarGoogle ScholarCross RefCross Ref
  5. Salman A, Ferozpuri A, Homsirikamol E, A scalable ECC processor implementation for high-speed and lightweight with side-channel countermeasures[C]//2017 international conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 2017: 1-8.Google ScholarGoogle Scholar
  6. Yu W, Zhou Z. A compressible image encryption method based on nondegenerate hyperchaotic system and its implementation on ZYNQ[J]. International Journal of Circuit Theory and Applications, 2022, 50(10): 3661-3681.Google ScholarGoogle ScholarCross RefCross Ref
  7. Awaludin A M, Larasati H T, Kim H. High-speed and unified ECC processor for generic Weierstrass curves over GF (p) on FPGA[J]. Sensors, 2021, 21(4): 1451.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ding J, Li S. A reconfigurable high-speed ECC processor over NIST primes[C]//2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017: 1064-1069.Google ScholarGoogle Scholar
  9. Ding J, Li S, Gu Z. High-speed ECC processor over NIST prime fields applied with Toom–Cook multiplication[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2018, 66(3): 1003-1016.Google ScholarGoogle ScholarCross RefCross Ref
  10. Patel J J, Reddy N, Kumari P, Embedded Linux platform for data acquisition systems[J]. Fusion Engineering and Design, 2014, 89(5): 684-688.Google ScholarGoogle ScholarCross RefCross Ref
  11. Khan S, Javeed K, Shah Y A. High-speed FPGA implementation of full-word Montgomery multiplier for ECC applications[J]. Microprocessors and Microsystems, 2018, 62: 91-101.Google ScholarGoogle ScholarCross RefCross Ref
  12. Feng X, Li S. A high performance FPGA implementation of 256-bit elliptic curve cryptography processor over GF (p)[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015, 98(3): 863-869.Google ScholarGoogle Scholar
  13. Zhang D, Bai G. High-performance implementation of SM2 based on FPGA[C]//2016 8th IEEE International Conference on Communication Software and Networks (ICCSN). IEEE, 2016: 718-722.Google ScholarGoogle Scholar
  14. Deschamps J P, Sutter G. Hardware implementation of finite-field division[J]. Acta Applicandae Mathematica, 2006, 93: 119-147.Google ScholarGoogle ScholarCross RefCross Ref
  15. Anagreh M, Vainikko E, Laud P. Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing[C]//ICISSP. 2019: 238-245.Google ScholarGoogle Scholar

Index Terms

  1. ECC-based Secure Communication Platform for Unmanned Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AAIA '23: Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications
      November 2023
      406 pages
      ISBN:9798400708268
      DOI:10.1145/3603273

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 January 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format