Abstract

This paper presents throughout research on the security issues related to drone transmission. These topics were addressed and explained, in particular the aspects relating to cybersecurity, for utmost clarity. These include threats and vulnerabilities, drone transmission the impact of encryption on latency, and the details of the encryption methods AES-128, AES-256, and ChaCha20 that were used in the experiment described in the paper. Each encryption method performance was measured and outputted by the Python code developed and used in the experiment. Afterwards, the performance of each method was analyzed in relation to their decryption time, encryption time, end to end time, and packet loss percentage. In addition, future challenges and potential limitations of the experiment were discussed. Future research directions were also established such as related lightweight ciphers to ChaCha20 and the implementation of multi-drone protocols. The paper finished with a conclusion detailing the strengths and weaknesses of each encryption and the situations in real life where each would be most beneficial in drone transmission

Faculty Advisor/Mentor

Murat Kuzlu

Document Type

Paper

Disciplines

Cybersecurity | Digital Communications and Networking | Information Security

DOI

10.25776/nbkq-8p81

Publication Date

12-3-2025

Upload File

wf_yes

Share

COinS
 

Viability of Widely Used Encryption Schemes in Drone Transmission

This paper presents throughout research on the security issues related to drone transmission. These topics were addressed and explained, in particular the aspects relating to cybersecurity, for utmost clarity. These include threats and vulnerabilities, drone transmission the impact of encryption on latency, and the details of the encryption methods AES-128, AES-256, and ChaCha20 that were used in the experiment described in the paper. Each encryption method performance was measured and outputted by the Python code developed and used in the experiment. Afterwards, the performance of each method was analyzed in relation to their decryption time, encryption time, end to end time, and packet loss percentage. In addition, future challenges and potential limitations of the experiment were discussed. Future research directions were also established such as related lightweight ciphers to ChaCha20 and the implementation of multi-drone protocols. The paper finished with a conclusion detailing the strengths and weaknesses of each encryption and the situations in real life where each would be most beneficial in drone transmission