A secure communication protocol for civil drones

Ayad Al-Adhami, Rajaa K. Hasoun, Ekhlas K. Gbashi, Soukaena Hassan


This paper introduces a secure communication protocol that provides secured communication pathways to manipulate drones through unsecured communication. The deployment of the proposed protocol works through providing two secured communication paths; drones to the drone’s controller path and controller to data centre path. The first secured communication path has achieved a high level of security and privacy by using a modification of SHA-1 method and an advanced encryption method. The modification of the SHA-1 is called 83SHA-1. These modifications can increase rounds in the first stage up to 83 rounds, inject each round with expansion and S-Boxes procedures that are used in DES to extend length from 160 to 240 bits then reduce it from 240 to 160 bits. After hash data from the drone then use the advanced encryption method which is called Geffe-Genetic (GG) Encryption algorithm where three types of keys will be used for deception attackers. The second accomplishment is to ensure providing secure communication between the drone’s controller and datacentre by using RNA-RADG-CBC (RRCBC) encryption algorithm where will generate an initialization vector (IV) for cipher block chaining (CBC) randomly, generate keys, and propose an encryption/decryption method. The security analysis shows a promising high security level of drones’s data.


Cipher block chaining; Drones; Encryption; Hash function SHA-1; RADG algorithm; Ribouncleic acid RNA;

Full Text:


DOI: http://doi.org/10.11591/ijeecs.v27.i3.pp1490-1501


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics