Date of Award

8-2024

Document Type

Project

Degree Name

Master of Science in Information Systems and Technology

Department

Information and Decision Sciences

First Reader/Committee Chair

Conrad Shayo PhD, Committee Member, Co-Chair, & Chair, Information and Decision Sciences Department

Abstract

This culminating experience project addresses the pressing cybersecurity challenges encountered by unmanned autonomous vehicles. The research provides a comprehensive literature review on how hybrid encryption techniques can improve the security of its communication systems. The chosen research questions guiding this study are: (Q1) How can we enhance cybersecurity measures to safeguard the communication and transmission of sensitive data from unmanned systems, thereby preventing unauthorized access by malicious actors? (Q2) How can we ensure the confidentiality and integrity of messages exchanged with unmanned systems to a command-and-control center operating on the tactical edge? (Q3) How can hybrid encryption tackle the consumption problem of substantial processing power required for encrypting and transmitting data in unmanned systems?

The findings are: Q1. hybrid security strategy ensures strong communication integrity and safeguards against malicious interception in operations involving unmanned systems; Q2. lightweight cryptographic algorithms and hybrid encryption methods specifically designed for unmanned systems efficiently protect both the confidentiality and integrity of messages while optimizing computational resources; Q3. when using hybrid encryption, unmanned systems can effectively manage power consumption while maintaining robust data security protocols. The conclusions are: Q1. combining symmetric encryption for efficient data handling with asymmetric encryption for secure key exchange significantly enhances data confidentiality, integrity, and overall security. Q2. end-to-end encryption, secure key management, and authenticated encryption mechanisms within a hybrid encryption framework reduce risks associated with interception, tampering, and unauthorized access via unmanned systems. Q3. integrating efficient algorithm selection, optimized key management, resource-aware encryption, and dynamic key generation methods, can address power consumption concerns. Future research directions should include deeper exploration of hybrid encryption practices within unmanned systems to advance understanding in the realm of communication systems for autonomous vehicles.

Share

COinS