Abstract
This paper presents throughout research on the security issues related to drone transmission. These topics were addressed and explained, in particular the aspects relating to cybersecurity, for utmost clarity. These include threats and vulnerabilities, drone transmission the impact of encryption on latency, and the details of the encryption methods AES-128, AES-256, and ChaCha20 that were used in the experiment described in the paper. Each encryption method performance was measured and outputted by the Python code developed and used in the experiment. Afterwards, the performance of each method was analyzed in relation to their decryption time, encryption time, end to end time, and packet loss percentage. In addition, future challenges and potential limitations of the experiment were discussed. Future research directions were also established such as related lightweight ciphers to ChaCha20 and the implementation of multi-drone protocols. The paper finished with a conclusion detailing the strengths and weaknesses of each encryption and the situations in real life where each would be most beneficial in drone transmission
Faculty Advisor/Mentor
Murat Kuzlu
Document Type
Paper
Disciplines
Cybersecurity | Digital Communications and Networking | Information Security
DOI
10.25776/nbkq-8p81
Publication Date
12-3-2025
Upload File
wf_yes
Included in
Cybersecurity Commons, Digital Communications and Networking Commons, Information Security Commons
Viability of Widely Used Encryption Schemes in Drone Transmission
This paper presents throughout research on the security issues related to drone transmission. These topics were addressed and explained, in particular the aspects relating to cybersecurity, for utmost clarity. These include threats and vulnerabilities, drone transmission the impact of encryption on latency, and the details of the encryption methods AES-128, AES-256, and ChaCha20 that were used in the experiment described in the paper. Each encryption method performance was measured and outputted by the Python code developed and used in the experiment. Afterwards, the performance of each method was analyzed in relation to their decryption time, encryption time, end to end time, and packet loss percentage. In addition, future challenges and potential limitations of the experiment were discussed. Future research directions were also established such as related lightweight ciphers to ChaCha20 and the implementation of multi-drone protocols. The paper finished with a conclusion detailing the strengths and weaknesses of each encryption and the situations in real life where each would be most beneficial in drone transmission