Black Box Logging System for Drones

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-3
Year of Publication : 2019
Authors : Smrithi.S, Ms.Vijayalakshmi .R, Dr.Veeralakshmi.P
  10.14445/22312803/IJCTT-V67I3P104

MLA

MLA Style: Smrithi.S, Ms.Vijayalakshmi .R, Dr.Veeralakshmi.P, "Black Box Logging System for Drones" International Journal of Engineering Trends and Technology 67.3 (2019): 13-18.

APA Style: Smrithi.S, Ms.Vijayalakshmi .R, Dr.Veeralakshmi.P, (2019). Black Box Logging System for Drones. International Journal of Engineering Trends and Technology, 67(3), 13-18.

Abstract
Unmanned aerial vehicles (UAVs) like drones are in dire need of efficient data retrieval and regular updates. This project aims to create a software use a fully autonomous system for the effective functioning of drones either implicitly or partially independent of human control. The implementation is done by providing access only to any one of two designated aviation controller who is given with an irreplaceable token by the Administrator at a time using an asymmetric cryptographic algorithm-RSA Algorithm. This algorithm ensures the avoidance of vulnerability to the drone system. The goal of the proposed research architecture is to provide the recovery mechanism for the obstacles encountered by the drones in the real-time scenarios and momentary payload information. This approach will be further evolved based on adaptive learning software (SCENGEN) to facilitate the drones with appropriate solutions for wisely dealing with the security attacks such as repudiation, masquerade during its fly time. The drone’s momentary payload information is gathered with respect to three scenarios namely: Target Reached, Midway Hurdle encountered and Hacking of drone control is finally embedded in the Black Box cloud.

Reference
[1] Bas vergouw, Huub Nagel, Geert Bondt and Bart custers,“Drone Technology: Types, Payloads , Applications, Frequency Spectrum Issues and Future Developments” ,2016, B. Custers (ed.), The Future Of Drone Use, Information Technology and Law Series 27.
[2] Scengen Product, 2011, https://scorpioncomputerservices.com/scengen.
[3] Kwangsoo joa , Junyoung Heo , Jinman Jung , Bongjae Kim, Hong Min ,“A Rendezvous Point Estimation considering Drone Speed And Data Collection Delay” ,2017, 4th International conference on Computer Applications and Information Processing Technology (CAIPT).
[4] Arne Devos, Emad Ebeid, Poramate Manoonpong, “Development of Autonomous Drones for Adaptive Obstacle Avoidance in Real World Environments”, 2018, 21st euro micro conference on Digital System Design (DSD).
[5] Majed Alwateer , Seng W. Loke , Wenny Rahayu, “Drone Services: An Investigation via Prototyping and Simulation”, 2018, IEEE 4th World Forum On Internet Of Things(WF-IOT).
[6] Widodo Budiharto, Alexander A S Gunawan, Jarot S. Suroso, Andry Chowanda, Aurello Patrik and Gaudi Utama ,“Fast Object Detection for Quadcopter Drone using Deep Learning” ,2018 , 3rd International Conference on Computer and Communication Systems (ICCCS).
[7] Sam Siewert, Andalibi Mehran, Stephen Bruder, Iacopo Gentilini, Jonathan Zuchholz, “Drone Net Architecture for UAS Traffic Management
Multi-modal Sensor Networking Experiments”,2018 ,IEEE Aerospace Conference. [8] Dubravko Miljković ,“Methods for Attenuation of Unmanned Aerial Vehicle Noise”,2018, 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[9] Lukas Sada Arihta Sinulingga, Fatwa Ramdani, Mochamad Chandra Saputra, “Spatial Multi-criteria Evaluation to Determine Safety Area Flying Drone”, 2017, International Symposium On Geoinformatics (ISyG).
[10] Evsen Yanmaz, Markus Quaritsch, Saeed Yahyanejad, Bernhard Rinner, Hermann Hellwagner, and Christian Bettstetter, “Communication and Coordination for Drone Networks”, 2016.

Keywords
Unmanned Aerial Vehicles (UAVs), Adaptive Learning, Artificial Intelligence Cryptography and network security, Deep Learning, Database and Cloud computing.