Geoinformation system for monitoring forest fires and data encryption for low-orbit vehicles

Khuralay Moldamurat, Makhabbat Bakyt, Dastan Yergaliyev, Dinara Kalmanova, Anuar Galymzhan, Abylaikhan Sapabekov

Abstract


This article discusses two important aspects of unmanned aerial vehicles (UAVs): forest fire monitoring and data security for low-orbit vehicles. The first part of the article is devoted to the development of a geographic information system (GIS) for monitoring and forecasting the spread of forest fires. The system uses intelligent processing of aerospace data obtained from UAVs to timely detect fires, determine their characteristics and forecast the dynamics of development. The second part of the article focuses on the problem of high-speed encryption of data transmitted from low-orbit aircraft. An effective encryption algorithm is proposed that ensures high data processing speed and reliable protection of information from unauthorized access. The article presents the results of modeling and analysis of the effectiveness of the proposed solutions.

Keywords


Unmanned aerial vehicles; Geographic information system; Forest fires; Data encryption; Low-orbit vehicles

Full Text:

PDF

References


A. K. Jain, "Advances in pattern recognition," Pattern Recognition Letters, vol. 120, pp. 1-6, Jan. 2019. doi: 10.1016/j.patrec.2018.09.011

M. A. Mohammed et al., "UAV path planning for forest fire monitoring using deep reinforcement learning," IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 8, pp. 3437-3446, Aug. 2020. doi: 10.1109/TITS.2019.2938515

Y. Xu, L. Zhang, and C. Liu, "A deep learning approach for forest fire detection using UAV images," Remote Sensing, vol. 12, no. 11, p. 1806, May 2020. doi: 10.3390/rs12111806

S. Atanov, Y. S. Seitbattalov, and Z. Moldabayeva, "A Novel Approach to Data Security in the Internet of Things Based on Machine Learning Methods," 2020 IEEE International Conference on Smart Information Systems and Technologies (SIST), Sep. 2020, doi: 10.1109/sist49865.2020.9224801.

J. Li et al., "A survey of remote sensing image classification techniques," Neurocomputing, vol. 367, pp. 204-217, Dec. 2019. doi: 10.1016/j.neucom.2019.08.011

R. A. Shaikh, "Lightweight cryptography for IoT: A survey," Cryptologia, vol. 44, no. 3, pp. 223-248, May 2020. doi: 10.1080/01611194.2019.1610467

D. Gligoroski, S. Samardjiska, and H. Jacobsen, "MK-KLEIN: A family of lightweight block ciphers based on multivariate quadratic KLEIN maps," IACR Transactions on Symmetric Cryptology, vol. 2020, no. 1, pp. 338-364, Mar. 2020. doi: 10.13154/tosc.v2020.i1.338-364

A. Bogdanov et al., "PRESENT: An ultra-lightweight block cipher," CHES 2007, pp. 450-466, Sep. 2007. doi: 10.1007/978-3-540-74735-2_31

G. Leander and A. Poschmann, "On the classification of 4 bit S-Boxes," WAIFI 2007, pp. 159-176, Jun. 2007. doi: 10.1007/978-3-540-73074-3_13

Khuralay Moldamurat, Sabyrzhan Atanov, Kairat Akhmetov, Makhabbat Bakyt (CA), Niyaz Belgibekov, Assel Zhumabayeva, Yuriy Shabayev, Improved unmanned aerial vehicle control for efficient obstacle detection and data protection, IAES International Journal of Artificial Intelligence (IJ-AI), Vol. 13, No. 3, September 2024, pp. 3576-3587, ISSN: 2252-8938, DOI: http://doi.org/10.11591/ijai.v13.i3.pp3576-3587

L. R. Knudsen, "Truncated and higher order differentials," Fast Software Encryption 1994, pp. 196-211, Dec. 1994. doi: 10.1007/3-540-60590-8_16

J. Daemen and V. Rijmen, "The design of Rijndael: AES - the advanced encryption standard," Information Security and Cryptography, Springer, 2002.

N. Ferguson, B. Schneier, and T. Kohno, Cryptography engineering: Design principles and practical applications, John Wiley & Sons, 2010.

C. Paar and J. Pelzl, Understanding cryptography: A textbook for students and practitioners, Springer Science & Business Media, 2009.

B. Schneier, Applied cryptography: Protocols, algorithms, and source code in C, John Wiley & Sons, 2015.

N. Koblitz, "Elliptic curve cryptosystems," Mathematics of computation, vol. 48, no. 177, pp. 203-209, 1987.

V. Miller, "Use of elliptic curves in cryptography," Advances in cryptology—CRYPTO'85 proceedings, pp. 417-426, 1986.

D. Hankerson, A. Menezes, and S. Vanstone, Guide to elliptic curve cryptography, Springer Science & Business Media, 2006.

I. Blake, G. Seroussi, and N. Smart, Elliptic curves in cryptography, Cambridge university press, 1999.

Kh. Moldamurat, S. Makysh, S.Atanov, M. Bakyt. Device for cryptographically protected control of a mobile robot. Рatent for utility model No. 2024/0437.2 dated 03/26/2024, RSE on the right of economic management "National Institute Of Intellectual Property" Of The Ministry Of Justice Of The Republic Of Kazakhstan.

S. Atanov, Z. Seitbattalov, and Z. Moldabayeva, "Application of Machine Learning Algorithms for Predicting the Remaining Useful Life of Aircraft Engines," 2021 IEEE International Conference on Smart Information Systems and Technologies (SIST), Apr. 2021, doi: 10.1109/sist50301.2021.9465995.

J. Katz and Y. Lindell, Introduction to modern cryptography, CRC press, 2020.

D. Stinson and M. Paterson, Cryptography: Theory and practice, CRC press, 2018.

A. Joux, "Algorithmic cryptanalysis," CRC press, 2009.

P. Rogaway, "Evaluation of some blockcipher modes of operation," Cryptology ePrint Archive, Report 2011/174, 2011.

M. Bellare, P. Rogaway, and D. Wagner, "The EAX mode of operation," Fast Software Encryption 2004, pp. 389-407, Feb. 2004. doi: 10.1007/978-3-540-25937-4_23

T. Peyrin and Y. Seurin, "Counter-in-tweak: Authenticated encryption modes for tweakable block ciphers," Advances in cryptology—CRYPTO 2016, pp. 33-63, Aug. 2016. doi: 10.1007/978-3-662-53008-5_2

M. J. Dworkin, "Recommendation for block cipher modes of operation: Galois/Counter Mode (GCM) and GMAC," National Institute of Standards and Technology, US Department of Commerce, 2007.

S. Gueron and M. E. Kounavis, "Intel® carry-less multiplication instruction and its usage for computing the GCM mode," Intel White Paper, vol. 32, 2010.

Khuralay Moldamurat, Yerzhan Seitkulov, Sabyrzhan Atanov, Makhabbat Bakyt, Banu Yergaliyeva, Enhancing Cryptographic Protection, Authentication, And Authorization In Cellular Networks: A Comprehensive Research Study, International Journal of Electrical and Computer Engineering (IJECE), Vol. 14, No. 1, February 2024, рр.479-487.

D. A. Osvik, J. W. Bos, D. Canright, and D. Krawczyk, "Fast software AES encryption," Fast Software Encryption 2010, pp. 75-93, Feb. 2010. doi: 10.1007/978-3-642-13858-4_5

E. Käsper and P. Schwabe, "Faster and timing-attack resistant AES-GCM," Cryptographic Hardware and Embedded Systems-CHES 2009, pp. 1-17, Sep. 2009. doi: 10.1007/978-3-642-04138-9_1

N. S. Abdel Rahman Aljawarneh, "A modified lightweight encryption algorithm for the internet of things," Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 1, pp. 225-232, Apr. 2020. doi: 10.11591/ijeecs.v18.i1.pp225-232

M. H. Al-Shareeda, M. A. Saare, and S. Manickam, "Unmanned aerial vehicle: a review and future directions," Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 2, p. 778, May 2023. doi: 10.11591/ijeecs.v30.i2.pp778-786

I. Jomaa, W. M. Saleh, Hassan, and Saja, "Secured drone communication based on Esalsa20 algorithm and 1d logistic map," Indonesian Journal of Electrical Engineering and Computer Science, vol. 29, no. 2, pp. 861-874, Feb. 2023. doi: 10.11591/ijeecs.v29.i2.pp861-874

W. Shafik, S. M. Matinkhah, S. S. Afolabi, and M. N. Sanda, "A 3-dimensional fast machine learning algorithm for mobile unmanned aerial vehicle base stations," International Journal of Advances in Applied Sciences, vol. 10, no. 1, p. 28, Mar. 2021. doi: 10.11591/ijaas.v10.i1.pp28-38

R. I. Boby, K. Abdullah, A. Z. Jusoh, N. Parveen, and M. Mahmud, "Adaptive control of nonlinear system based on QFT application to 3-DOF flight control system," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 5, p. 2595, Oct. 2019. doi: 10.12928/telkomnika.v17i5.12810

Duong Huu Ai, Van Loi Nguyen, Hoang Huu Duc, and Khanh Ty Luong, "On the performance of reconfigurable intelligent surface-assisted UAV-to-ground communication systems," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 21, no. 4, p. 736, Aug. 2023. doi: 10.12928/telkomnika.v21i4.24720

T. S. Gunawan, W. A. Yahya, E. Sulaemen, M. Kartiwi, and Z. Janin, "Development of control system for quadrotor unmanned aerial vehicle using LoRa wireless and GPS tracking," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 18, no. 5, p. 2674, Oct. 2020. doi: 10.12928/telkomnika.v18i5.16716

Makhabbat B., Khuralay M., Assem K., Adil M. and Dina S., “Integration of Cryptography and Navigation Systems in Unmanned Military Mobile Robots: A Review of Current Trends and Perspectives” CEUR Workshop Proceedings, Volume 36802024, 8th International Conference on Digital Technologies in Education, Science and Industry, DTESI 2023, Almaty 6 December 2023 through 7 December 2023, Code 199323.

A. Elbatal, A. M. Youssef, and M. M. Elkhatib, "Smart aerosonde UAV longitudinal flight control system based on genetic algorithm," Bulletin of Electrical Engineering and Informatics, vol. 10, no. 5, pp. 2433-2441, Oct. 2021. doi: 10.11591/eei.v10i5.2342

Electrical Engineering and Informatics, vol. 11, no. 6, pp. 3490-3497, Dec. 2022. doi: 10.11591/eei.v11i6.4185

K. K. Hasan, S. Saat, Y. Yusop, and R. Awal, "Development of self-charging unmanned aerial vehicle system using inductive approach," International Journal of Power Electronics and Drive Systems, vol. 13, no. 3, p. 1635, Sep. 2022. doi: 10.11591/ijpeds.v13.i3.pp1635-1644

S. K. Debnath et al., "Flight cost calculation for unmanned air vehicle based on path length and heading angle change," International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 11, no. 1, p. 382, Mar. 2020. doi: 10.11591/ijpeds.v11.i1.pp382-389

T.-L. Nguyen, D.-H. Ha, P. T. Tin, and H. D. Cong, "Unmanned aerial vehicle-aided cooperative regenerative relaying network under various environments," International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 6, p. 5153, Dec. 2021. doi: 10.11591/ijece.v11i6.pp5153-5159

A. N and U. S V, "Obstacle avoidance and distance measurement for unmanned aerial vehicles using monocular vision," International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, p. 3504, Oct. 2019. doi: 10.11591/ijece.v9i5.pp3504-3511

M. A. Massad, B. A. Alsaify, and A. Y. Alma’aitah, "Innovative unmanned aerial vehicle self-backhauling hybrid solution using RF/FSO system for 5G network," International Journal of Electrical and Computer Engineering, vol. 12, no. 4, p. 4483, Aug. 2022. doi: 10.11591/ijece.v12i4.pp4483-4506

H. V. C. Nguyen, H.-N. Nguyen, S.-P. Le, and M. Vozňák, "Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices," International Journal of Power Electronics and Drive Systems, vol. 13, no. 6, p. 6410, Dec. 2023. doi: 10.11591/ijece.v13i6.pp6410-6418

A. H. Ali, M. A. M. Al-Ja’afari, and S. H. Abdulwahed, "Performance assessment of antenna array for an unmanned air vehicle," International Journal of Electrical and Computer Engineering, vol. 10, no. 3, p. 2579, Jun. 2020. doi: 10.11591/ijece.v10i3.pp2579-2588

M. Bakyt, K. Moldamurat, D. Satybaldina, and N. Yurkov, "Modeling Information Security Threats for the Terrestrial Segment of Space Communications," CEUR Workshop Proceedings, vol. 3382, 2022.

A. Akhmadiya, K. Moldamurat, M. Jamshidi, S. S. Brimzhanova, N. Nabiyev, and A. Kismanova, "Application of Sentinel-1 SAR Data for Detecting a Nuclear Test Location in North Korea," vol. 48, no. 2, pp. 327-335, Jan. 2022. doi: 10.1080/07038992.2021.2025348

C. An, S. Jia, J. Zhou, and C. Wang, "Fast Model-Free Learning for Controlling a Quadrotor UAV With Designed Error Trajectory," IEEE Access, vol. 10, pp. 79669-79680, 2022. doi: 10.1109/access.2022.3194276

F. Wang, Q. Gu, B. Huang, Q. Wei, and T. Zhou, "Adaptive Event-Triggered Near-Optimal Tracking Control for Unknown Continuous-Time Nonlinear Systems," IEEE Access, vol. 10, pp. 9506-9518, Jan. 2022. doi: 10.1109/access.2021.3140076

A. S. Zhumabayeva and R. R. Bikeev, "Mathematical processing of information on radiation parameters of a moving object," Reliability and Quality of Complex Systems, vol. 3, no. 11, pp. 99-104, 2015.




DOI: https://doi.org/10.11591/csit.v6i1.p58-67

Refbacks

  • There are currently no refbacks.


Computer Science and Information Technologies
p-ISSN: 2722-323X, e-ISSN: 2722-3221
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Universitas Ahmad Dahlan (UAD).

CSIT Visitor Stats

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.