CN113870622A - Method and system for unmanned aerial vehicle information interaction by using safety short message - Google Patents

Method and system for unmanned aerial vehicle information interaction by using safety short message Download PDF

Info

Publication number
CN113870622A
CN113870622A CN202010546202.1A CN202010546202A CN113870622A CN 113870622 A CN113870622 A CN 113870622A CN 202010546202 A CN202010546202 A CN 202010546202A CN 113870622 A CN113870622 A CN 113870622A
Authority
CN
China
Prior art keywords
module
unmanned aerial
aerial vehicle
information
short message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010546202.1A
Other languages
Chinese (zh)
Inventor
仲川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010546202.1A priority Critical patent/CN113870622A/en
Publication of CN113870622A publication Critical patent/CN113870622A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft, e.g. air-traffic control [ATC]
    • G08G5/0017Arrangements for implementing traffic-related aircraft activities, e.g. arrangements for generating, displaying, acquiring or managing traffic information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method and a system for carrying out unmanned aerial vehicle information interaction by using a safety short message, relates to the field of communication and unmanned aerial vehicle, and particularly relates to a method and a system for carrying out unmanned aerial vehicle information interaction by using a communication public network to transmit a short message with a specific safety mechanism. With the increasing holding capacity of unmanned aerial vehicles, the unmanned aerial vehicles become main users of low-altitude airspace in China after the traditional general aircrafts. However, due to the characteristic of low speed and small size, the flight monitoring of the unmanned aerial vehicle becomes a main problem of low-altitude airspace monitoring in China. The operator public network has the most extensive regional coverage, and it is a most probable development direction to utilize the operator public network to carry out communication transmission of the unmanned aerial vehicle so as to complete corresponding supervision requirements. The invention designs a short message improvement system with safety characteristic by combining with the communication system of the public network, and the receiving end can verify the related instruction, thereby ensuring the information transmission safety and providing an effective way for the communication and monitoring of the low-slow small unmanned aerial vehicle.

Description

Method and system for unmanned aerial vehicle information interaction by using safety short message
Technical Field
The invention relates to the field of communication and unmanned aerial vehicles, in particular to a method and a system for carrying out information interaction on an unmanned aerial vehicle by transmitting a short message with a specific safety mechanism through a communication public network.
Background
An Unmanned Aerial Vehicle (UAV) is an Unmanned Aerial Vehicle operated by a radio remote control device and a self-contained program control device. An unmanned machine is in fact a generic term for unmanned aircraft.
Unmanned aerial vehicle Systems (UAS), also known as Unmanned Aircraft Systems, refer to a system of drones, associated remote control stations, required command and control data links, and any other components specified in an approved model design. In short, an airplane is provided with a remote control device.
The market and the application of the unmanned aerial vehicle are developing vigorously at present, and the unmanned aerial vehicle yield reaches 1800 hundred million yuan by 2025 years, and the annual average speed is increased by more than 25%.
In recent years, with the rapid development of the unmanned aerial vehicle technology, the unmanned aerial vehicle industry is also developed vigorously in China. Because unmanned aerial vehicle has the characteristics such as lower, unmanned casualty risk, survivability are strong, mobility is good, convenient to use, more and more industrial application constantly appears, if fields such as aerial photography, agriculture and forestry plant protection, electric power are patrolled and examined and have used unmanned aerial vehicle to replace traditional general airborne vehicle to engage in relevant operation activity on a large scale. With the increasing holding amount and the gradual increase of popularity of the unmanned aerial vehicle, the unmanned aerial vehicle becomes a main user of a low-altitude airspace in China after a traditional general aircraft. However, due to the characteristics of low speed and small speed (low altitude and low speed small aircraft), the monitoring of the flight of the unmanned aerial vehicle is difficult to be found by radar, and the main problem of the low altitude airspace monitoring in China is solved.
The flight control system of the unmanned aerial vehicle is a core component of the unmanned aerial vehicle system and is used for controlling the flight of the unmanned aerial vehicle, the performance of the flight control system directly influences the flight performance and the flight quality of the unmanned aerial vehicle, and the flight safety of the unmanned aerial vehicle is directly influenced. The flight control system collects flight state data measured by each sensor in real time, receives control commands and data transmitted by an uplink channel of the ground measurement and control station through the airborne wireless digital terminal, and outputs the control commands to the execution mechanism through calculation and processing so as to realize control of various flight modes and management and control of task equipment in the unmanned aerial vehicle; meanwhile, the state data of the unmanned aerial vehicle, an engine, an airborne power system and the working state parameters of the task equipment are transmitted to an airborne radio data terminal in real time and are transmitted back to the ground measurement and control station through a radio downlink channel.
At present, the data transmission communication modes of the unmanned aerial vehicle mainly comprise three types: radio, WiFi, and operator public networks. The preferred mode of the unmanned aerial vehicle is a radio station mode, 840.5-845MHz, 1430-1444MHz and 2408-2440MHz frequency bands are planned to be used for the unmanned aerial vehicle system according to radio frequency division rules of China and frequency spectrum application conditions, and the unmanned aerial vehicle is generally applied to various industrial unmanned aerial vehicles such as military police, plant protection, aerial survey and the like. Secondly, a data communication mode of WiFi is applied, the frequency band is commonly selected to be 2.4GHz, and the data communication mode also comprises civil radio transmission modes such as Bluetooth and the like similar to the WiFi. And finally, a 3G/4G public network of a mobile operator is adopted, the network of the mobile operator is usually optimized for covering the ground, the signal coverage is poor at a position 300 meters above the air, the normal operation height of the unmanned aerial vehicle during flying is 300-1000 meters above the air, and the unmanned aerial vehicle is difficult to acquire corresponding signals at a position above 300 meters, so that the real-time communication between a high-precision foundation reinforcing base station and an airborne mobile station cannot be ensured, and the current practical application is few.
However, it is noted that the public network of the operator has the widest geographical coverage, and with the gradual popularization of the commercial personal unmanned aerial vehicles, it is one of the most possible development directions to utilize the public network of the operator to perform communication transmission of the unmanned aerial vehicles so as to fulfill the corresponding regulatory requirements.
The uplink communication link of the drone mainly conveys the following information:
flight path data, flight control instructions, airborne accessory device control instructions, position update information, and the like;
the downlink communication link of the drone mainly transmits the following information:
position information of the aircraft, images and data of onboard accessories, flight status information, and the like.
With the evolution of Mobile communication networks in China, 2G (Global System for Mobile Communications ) networks gradually turn service emphasis towards the application of the field of Internet of things, and with the reduction of personal services, the possibility of air optimization network deployment exists. Through the analysis of the transmission data of the unmanned aerial vehicle, the data related to the service load of the auxiliary equipment is eliminated, the requirement on the constant speed rate of the flight control data flow of the unmanned aerial vehicle is low, and the data can be borne by the GSM and the extension technology thereof through constructing a short message data packet.
GSM services are mainly divided into two categories, telecommunications services, which provide the user with complete capabilities including terminal equipment functionality, and bearer services, which provide signal transmission capabilities (300bps-9.6kbps) between user/network interfaces.
GPRS is an english abbreviation for General Packet Radio service (General Packet Radio service), is a transition industry from 2G to 3G, is a new bearer service developed on GSM systems, and aims to provide Packet-form data services for GSM users. It is particularly suitable for intermittent, bursty, frequent, small data transfers, but also for occasional large data transfers. The theoretical bandwidth of GPRS can reach 171.2kb/s, and the practical application bandwidth is about 40-100 kb/s.
Edge (enhanced Data Rate for GSM evolution) is an enhanced Data Rate GSM evolution technology. EDGE has mainly adopted a new modulation method in GSM system, i.e. the most advanced multi-slot operation and 8PSK modulation technique at that time. Since 8PSK can expand the symbol-carrying information space of GMSK modulation techniques employed by GSM networks from 1 to 3, each symbol contains 3 times more information than it originally contained. The EDGE technology effectively improves the GPRS channel coding efficiency and the high-speed mobile data standard thereof, and the highest speed of the EDGE technology can reach 384 kbit/s.
In the invention, a GSM short message mode is used as a transmission mode for describing a small data packet short message mode as an instruction of the unmanned aerial vehicle, the mechanism can also be extended and applied to a GPRS/EDGE data technology and a subsequent public network transmission technology, such as 3G WCDMA/4G LTE/5G NR and the like, can be uniformly described as establishing a public network information transmission channel and is used for transmitting the instruction or report message of an unmanned aerial vehicle communication terminal through an air interface, and the message can be provided with an encryption field of security authentication.
The mechanism is also suitable for other types of terminals which receive the information interaction in the mode of the short message of the public network with the security certification small data packet.
If after the 2G (GSM/GPRS/EDGE) network is deployed for air optimization, stable unmanned aerial vehicle data connection can be achieved, unmanned aerial vehicle information can be transmitted in a data connection mode, but because the flight working mode of the unmanned aerial vehicle is complex in channel change, and a large number of unmanned aerial vehicles exist in a cell, long-term stable data bearing is possibly difficult to achieve, and frequent network breaking is possible.
The GSM short message is a storage and forwarding function completed by a short message center, and has a point-to-point working mode and a broadcast working mode.
GSM sends and receives short messages in three modes: BLOCK mode, TEXT mode, and PDU mode. The BLOCK mode is now rarely used; the TEXT mode can only send ASCII code, it can not send Chinese UNICODE code (technically can be used to send Chinese short message, but domestic mobile phone basically does not support); the PDU mode is complex to develop, a special function needs to be written to convert the text into the PDU format, but the PDU mode is supported by all mobile phones, any character set can be used, and the PDU mode is also a default coding mode of the mobile phones. Three types of coding can be used for transmitting and receiving short messages in PDU mode: 7-bit encoding, 8-bit encoding, and UCS2 encoding. 7-bit encoding is used to transmit plain ASCII characters; 8-bit encoding is commonly used to send data messages, such as pictures or ringtones; the UCS2 codes are used to send Unicode characters. The English is coded by Bit7, the maximum length of the user data before coding is 160 bytes, the Chinese is coded by UCS2, the maximum length of the user data before coding is 70 words, the binary data is sent and coded by Bit8, and the maximum length of the user data before coding is 140 bytes.
Figure BSA0000211535080000051
Table 1 example of short message sending string format
Figure BSA0000211535080000052
Figure BSA0000211535080000061
TABLE 2 example of short message received string format
As the GSM technology has long history, the technical system of the GSM is widely known, the situations such as illegal base stations and the like occur, and the unmanned aerial vehicle needs to pay attention to safety factors when communicating by using a public network to avoid the unfavorable situations such as hijacking and the like.
The traditional short message mainly faces to individual users, false information can be manually identified, and when the unmanned aerial vehicle adopts the short message as an instruction transmission method, a safety verification method needs to be additionally designed.
Therefore, the invention designs a short message improving system with safety characteristic by combining with the communication system of the public network, and the receiving end can verify the relevant instruction, thereby ensuring the information transmission safety.
Several representative encryption methods are described below, and the present invention is illustrated by way of example, without reference to details, and is not limited thereto:
1、MD5
MD5 Message Digest Algorithm (MD5 Message-Digest Algorithm), a widely used cryptographic hash function, can generate a 128-bit (16-byte) hash value (hash value) to ensure the integrity of the Message transmission. The programming of this set of algorithms is specified in the RFC 1321 standard. It should be noted that such algorithms cannot recover the original data from the encoded data.
2. Symmetric encryption
Symmetric encryption uses the encryption method of a single-key cryptosystem, and the same key can be used for both encryption and decryption of information.
The symmetric encryption algorithm is used for encrypting information such as sensitive data, and commonly used algorithms include:
des (data Encryption standard): the data encryption standard is high in speed, and the method is suitable for occasions of encrypting a large amount of data.
3DES (triple DES): based on DES, a block of data is encrypted for three times by three different keys, and the intensity is higher.
Aes (advanced Encryption standard): the advanced encryption standard is the next generation of encryption algorithm standard, and has high speed and high security level;
3. asymmetric encryption
Unlike symmetric encryption algorithms, asymmetric encryption algorithms require two keys: public key (publickey) and private key (privatekey). The public key and the private key are a pair, and if data is encrypted with the public key, only the corresponding private key can be used for decryption.
If the data is encrypted with a private key, it can only be decrypted with the corresponding public key. Since two different keys are used for encryption and decryption, this algorithm is called an asymmetric encryption algorithm.
RSA: the invention is invented by RSA company, is a public key algorithm supporting variable-length keys, and the length of a file block needing to be encrypted is also variable;
dsa (digital Signature algorithm): the digital signature algorithm is a standard DSS (digital signature standard);
ecc (ecc) current customers cryptograph): elliptic curve cryptography
ECC has absolute advantages over RSA in many ways, mainly in the following areas:
1, strong attack resistance. The same key length is many times more robust against attacks.
2, the calculation amount is small, and the processing speed is high. The overall speed of ECC is much faster than RSA, DSA.
And 3, the storage space occupation is small. The key size and system parameters of ECC are much smaller compared to RSA, DSA, meaning that it takes up much less storage space. This is of particular importance for the application of cryptographic algorithms on IC cards.
4, the bandwidth requirement is low. When long messages are encrypted and decrypted, the three types of cryptosystems have the same bandwidth requirement, but the ECC bandwidth requirement is much lower when the cryptosystems are applied to short messages, so that the ECC has wide application prospect in the field of wireless networks.
Disclosure of Invention
The invention provides a method and a system for unmanned aerial vehicle information interaction by using a safety short message.
The safety short message contains the encrypted field (or the whole) according to the appointed method, which can be used for user authentication/sensitive information protection and the like.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention discloses a method for carrying out unmanned aerial vehicle information interaction by using a safety short message, which comprises the following steps of:
the control console and the unmanned aerial vehicle are preset with instruction transmission formats (parameter names/types/lengths and the like), encryption mode selection (plaintext/encryption and decryption methods) of each parameter, and encryption and decryption parameters (keys and the like) corresponding to the selected encryption and decryption methods;
the control console can be located at a plurality of possible positions, is combined with different network units, and can finish encryption, decryption and short message transmission functions, such as a short message communication terminal, a network platform, a mobile phone operating software APP, a short message forwarding center and the like of a user;
step 101-106 is the console to drone direction,
step 101, a console receives an instruction for an unmanned aerial vehicle from an information source;
there may be different sources for the commands of the drone, such as the drone owner/aviation management;
different sources may have different sets of instruction parameters;
for unauthorized sources, since the unmanned aerial vehicle networking operation is different from personal operation, subsequent forwarding may not be performed;
102, the console carries out encryption operation on the instruction according to a preset mode;
because the encryption and decryption operations can increase processing load, the non-sensitive information part in the instruction can be sent in a clear text in an appointed manner, and only the parameter part with the requirement is encrypted or verified in an appointed manner;
103, the console sends a short message through the base station;
when the base station detects that the unmanned aerial vehicle communication terminal is covered by the base station and is attached to a network, sending a short message to the unmanned aerial vehicle communication terminal;
104, receiving a short message by the unmanned aerial vehicle communication terminal through a signal of an attached base station;
105, the unmanned aerial vehicle communication terminal decrypts the received information according to a preset mode;
in the process, the received short message is decrypted/verified according to a convention mode;
step 106, the unmanned aerial vehicle communication terminal sends the passed instruction to a corresponding module for execution;
if the flight related instruction is adopted, the state detection instruction (power surplus and the like) is transmitted to the corresponding flight control module or the auxiliary equipment;
the steps 107-112 are the direction from the drone to the console, which can be performed separately with the steps 101-106,
step 107, the unmanned aerial vehicle communication terminal generates sending information;
the information may be triggered and generated by receiving an instruction, such as receiving a state detection instruction and returning to the owner, or triggered by other conditions such as a timer, such as generating a position report every 30 seconds and sending the position report to an aviation management department;
108, encrypting the unmanned aerial vehicle communication terminal according to an appointed mode;
step 109, the unmanned aerial vehicle establishes a communication link and sends a short message when the unmanned aerial vehicle is in the coverage of the base station;
step 110, the base station receives the short message and forwards the short message to the console;
step 111, the console carries out decryption operation according to the preset setting;
and 112, the control console transmits the information to the corresponding information requesting party, if the track information is transmitted to the aviation management department, the owner instruction feedback information is returned to the owner.
The invention also discloses a system for unmanned aerial vehicle information interaction by using the safety short message, as shown in fig. 2, the system comprises:
a console, an unmanned aerial vehicle communication terminal;
the console includes:
the module 201, the preset information module,
the module is provided with preset information which comprises an agreed format for information interaction with the unmanned aerial vehicle communication terminal and parameter configuration such as an encryption and decryption method/key corresponding to different messages of each user;
the module 202, the security code module,
the configuration information is obtained from the module 201, the operation instruction obtained from the instruction source is encrypted according to the appointed mode, and a short message transmission character string is formed and sent to the module 203;
the module 203, the short message sending module,
sending a short message through a base station to which the unmanned aerial vehicle is attached;
the module 204, the short message receiving module,
receiving a short message through a base station attached to the unmanned aerial vehicle;
the module 205, the security decoding module,
the slave module 201 acquires the configuration information, decrypts the received short message according to an appointed mode, and distributes decryption information;
unmanned aerial vehicle communication terminal includes:
a module 206, a preset information module, wherein the module has preset information, including an agreed format for information interaction with a console, and parameter configuration such as an adopted encryption and decryption method/key;
a module 207 for receiving short messages, which receives short messages from the attached base station; and sends the received information to the module 208 for decryption;
the module 208, the security decoding module,
the slave module 206 acquires the configuration information, decrypts the short message received from the module 207 according to an appointed mode, and sends the short message to the module 209 for execution;
the module 209, the instruction execution module,
executed according to instructions received by block 208;
the module 210, the information feedback module,
the unmanned aerial vehicle generates report information, the report information can be generated by receiving an instruction trigger, such as receiving a state detection instruction and replying to the owner, and can also be triggered by other conditions such as a timer, such as generating a position report every 30 seconds and sending the position report to an aviation management department;
the module 211, the security code module,
the slave module 206 acquires the configuration information, encrypts the information generated by the slave module 210 according to an agreed mode to form a sending character string, and sends the sending character string to the module 212 for sending;
the module 212, the short message sending module,
and establishing communication connection with the base station, and sending the short message generated by the module.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a system block diagram of the present invention;
FIG. 3 is a single user embodiment of the present invention;
FIG. 4 is a multi-user embodiment of the present invention;
FIG. 5 is a diagram of an embodiment of the present invention for adding user identity authentication to the short message content;
FIG. 6 is an example of the handling method convention according to different information destinations and information sensitivity levels of the present invention;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
The operation command usually includes operation code and operation parameter, the sender and receiver sides agree on a uniform parsing format for the transmitted short message, for convenience, the present invention is described by using JSON format, the actual usage is not limited to this (for example, TLV encoding, Tag-Length-Value), JSON (javascript Object notification) is a lightweight data exchange format, which is easy for human reading and writing, and is also easy for machine parsing and generation, JSON can convert the data Object into a string format, for example, { "code": "go", "direction": "up", "speed": "50", "height": "300" }' means a rise to a height of 300 meters at a speed of 50 km/h. The generated JSON character string forms short message content.
FIG. 3 is a single user embodiment of the present invention; as described in relation to figure 3 of the drawings,
the owner of this embodiment carries out communication control flight through SMS mode and unmanned aerial vehicle, and the control cabinet is established in owner's cell-phone department this moment, and owner and unmanned aerial vehicle all have the number of public network settlement to be used for the communication.
After the unmanned aerial vehicle flies to a certain height, the personal wireless network connection between the host and the unmanned aerial vehicle is disconnected, the public network connection mode of the unmanned aerial vehicle is started, an operation instruction is waited,
the main machine sends a short message operation instruction' { "code": "report", "choice": "location" } 'requires to acquire the position information of the unmanned aerial vehicle, and because the unmanned aerial vehicle is not necessarily in a network connection state when an operation instruction is issued, the instruction can be temporarily stored in the short message service center until the unmanned aerial vehicle is sent through the base station after accessing the communication network, and replies the' { "code": "report _ response", "location": "aaa-bbb-ccc", "time": "x: y: z' indicates that the position is at the aaa-bbb-ccc position at the x point y minutes and z seconds, and the short message center forwards the reply short message to the owner after receiving the reply short message.
The main machine sends a short message operation instruction' { "code": "go", "location": "mmm-nnn-kkk" } ', instructing the drone to fly to the site mmm-nnn-kkk, the drone executes the instruction and may feedback acknowledgement' { "code": "go _ response", "location": "mmm-nnn-kkk" }.
FIG. 4 is a multi-user embodiment of the present invention; as described in relation to figure 4 of the drawings,
the embodiment comprises two legal information sources (owner and aviation management department), the two information sources and a control console deployed in a short message service center are in communication connection (including but not limited to fixed network connection, wireless access, mobile phone APP/short message mode and the like) in any mode, and the control console of the short message service center establishes communication contact with an unmanned aerial vehicle through connection with a base station and sends and receives short messages.
Assuming that the unmanned aerial vehicle needs to report the position information every 30 seconds according to aviation management regulations and a no-fly area exists in the flight area, the unmanned aerial vehicle regularly triggers a position report short message and sends a { "code" to a designated number of an aviation management department: "report _ response", "location": "aaa-bbb-ccc", "time": "x: y: z '}', if no public network connection exists, after the public network can be accessed, a stored track report '{ "code': "report _ location _ list", "time": "x: y: z "location": [ "a 1-b1-c 1", "a 2-b2-c 2", "a 3-b3-c 3" ] }', which indicates that from time x: y: z the flight trajectory starting at a contracted time interval.
It should be noted that it is also feasible that the communication terminal of the unmanned aerial vehicle communicates with a plurality of users respectively, but a unified multi-user control center platform is provided, so that user authentication, information sharing and instruction conflict processing procedures can be effectively performed, for example, only the user in the authorized user list can communicate with the unmanned aerial vehicle terminal; when a user needs to acquire the position information of the unmanned aerial vehicle, the console can select the latest and effective position report in a certain time range to directly reply, so that the air interface transmission pressure is reduced; the console can acquire the no-fly zone information of the air traffic control department, and when the user instruction violates the relevant regulations, if the target location enters the no-fly zone, the console can stop forwarding the instruction and feed back the no-fly zone information to the user.
Fig. 5 is an embodiment of adding user identity authentication to the short message content according to the present invention, because the GSM system is widely known, and there are phenomena such as a pseudo base station and a pseudo terminal, and in order to improve the safety of the unmanned aerial vehicle, security authentication needs to be enhanced, in this example, an authentication code field, such as' { "code": "report", "index": "xyz" "verify _ code": "MD 5(index + key)"', generates a verification code (verify _ code) for each instruction according to MD5 algorithm by using instruction sequence number (index) and preset key (key), the receiving end needs to generate the same MD5 verification code according to the sequence number and the agreed key to confirm that the corresponding information passes through effectively to execute the corresponding operation, because the short message transmission has the possibility of being repeatedly transmitted, the receiving end should be executed in increments according to the sequence number to avoid repeatedly executing the same instruction, and the time stamp is used to replace the sequence number when the verification code is generated, which can achieve similar effects, for example, the time stamp is x: y: z' { "code": "report", "time": "x: y: z "verify _ code": "MD 5 (x: y: z + key)"'.
The terminal can also combine other information in the short message, such as whether the number of the sending terminal is in a legal instruction source stored by the local machine, and the like to make comprehensive judgment.
Fig. 6 is an example of processing method agreement according to different information destinations and information sensitivity levels, where a location report of an unmanned aerial vehicle belongs to non-sensitive information, and agreement plaintext is sent, and a user instruction information agreement adopts a method of verifying a user identity using an MD5 key, and when a suspicious base station signal is frequently searched or an abnormal instruction is received many times, because an illegal action is suspected, report information encrypted by an RSA key published by a telecommunication management department is sent to a number of the telecommunication management department. The invention can appoint different encryption modes through different communication objects and different communication contents, thereby achieving the unification of safety and usability.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (9)

1. A method for carrying out unmanned aerial vehicle information interaction by using a safety short message is characterized by comprising the following steps:
step 101-106 is the direction from the console to the unmanned aerial vehicle;
step 101, a console receives an instruction for an unmanned aerial vehicle from an information source;
102, the console carries out encryption operation on the instruction according to a preset mode;
103, the console sends a short message through the base station;
104, receiving a short message by the unmanned aerial vehicle communication terminal through a signal of an attached base station;
105, the unmanned aerial vehicle communication terminal decrypts the received information according to a preset mode;
step 106, the unmanned aerial vehicle communication terminal sends the passed instruction to a corresponding module for execution;
step 107-112 is the direction from the unmanned aerial vehicle to the console;
step 107, the unmanned aerial vehicle communication terminal generates sending information;
108, encrypting the unmanned aerial vehicle communication terminal according to an appointed mode;
step 109, the unmanned aerial vehicle establishes a communication link and sends a short message when the unmanned aerial vehicle is in the coverage of the base station;
step 110, the base station receives the short message and forwards the short message to the console;
step 111, the console carries out decryption operation according to the preset setting;
and step 112, the console forwards the information to the corresponding information requester.
2. The method of claim 1, wherein the short message transmitted between the communicating parties includes a field generated by a preset encryption method (including a bulk encryption condition).
3. The method of claim 1, wherein the original information of the encrypted field generated by the predetermined method may contain a predetermined key.
4. The method of claim 1, wherein the original information of the encrypted field generated by the predetermined method may contain a sequence number or time information of each piece of information.
5. The method of claim 1, wherein independent codec formats and information encryption methods can be preset for the short message contents of different purposes between the communication parties.
6. The method according to claim 1, wherein the unmanned aerial vehicle communication terminal can be set with one or more legal information sources and corresponding independent information processing methods.
7. The method of claim 1, wherein when multiple legitimate sources of information are connected to the console, information for each communication link can be shared to establish the instruction collision handling process.
8. The method of claim 1, wherein the console is capable of being located at a plurality of possible network elements, and wherein the functions of encrypting and decrypting and communicating with the communicating party are performed.
9. A system for unmanned aerial vehicle information interaction using secure short messages, the system comprising:
a console, an unmanned aerial vehicle communication terminal;
the console includes:
the module 201, the preset information module,
the module is provided with preset information which comprises an agreed format for information interaction with the unmanned aerial vehicle communication terminal and parameter configuration such as an encryption and decryption method/key corresponding to different messages of each user;
the module 202, the security code module,
the method comprises the steps that configuration information is obtained from a module 201, an operation instruction obtained from an instruction source is encrypted according to an appointed mode, a short message transmission character string is formed, and the short message transmission character string is sent to a module 203;
the module 203, the short message sending module,
sending a short message through a base station to which the unmanned aerial vehicle is attached;
the module 204, the short message receiving module,
the module 205, the security decoding module,
unmanned aerial vehicle communication terminal includes:
a module 206, a preset information module, wherein the module has preset information, including an agreed format for information interaction with a console, and parameter configuration such as an adopted encryption and decryption method/key;
a module 207 for receiving short messages, which receives short messages from the attached base station; and sends the received information to module 208 for decryption;
the module 208, the security decoding module,
the slave module 206 acquires the configuration information, decrypts the short message received from the module 207 according to an appointed mode, and sends the short message to the module 209 for execution;
the module 209, the instruction execution module,
executed according to instructions received by block 208;
the module 210, the information feedback module,
the unmanned aerial vehicle generates report information;
the module 211, the security code module,
the slave module 206 acquires the configuration information, encrypts the information generated by the slave module 210 according to an agreed mode to form a sending character string, and sends the sending character string to the module 212 for sending;
the module 212, the short message sending module,
and establishing communication connection with the base station, and sending the short message generated by the module.
CN202010546202.1A 2020-06-12 2020-06-12 Method and system for unmanned aerial vehicle information interaction by using safety short message Pending CN113870622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010546202.1A CN113870622A (en) 2020-06-12 2020-06-12 Method and system for unmanned aerial vehicle information interaction by using safety short message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010546202.1A CN113870622A (en) 2020-06-12 2020-06-12 Method and system for unmanned aerial vehicle information interaction by using safety short message

Publications (1)

Publication Number Publication Date
CN113870622A true CN113870622A (en) 2021-12-31

Family

ID=78980899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010546202.1A Pending CN113870622A (en) 2020-06-12 2020-06-12 Method and system for unmanned aerial vehicle information interaction by using safety short message

Country Status (1)

Country Link
CN (1) CN113870622A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116758782A (en) * 2023-08-18 2023-09-15 浙江凡双科技股份有限公司 Unmanned aerial vehicle identification method and device based on wireless spectrum analysis

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116758782A (en) * 2023-08-18 2023-09-15 浙江凡双科技股份有限公司 Unmanned aerial vehicle identification method and device based on wireless spectrum analysis
CN116758782B (en) * 2023-08-18 2023-11-03 浙江凡双科技股份有限公司 Unmanned aerial vehicle identification method and device based on wireless spectrum analysis

Similar Documents

Publication Publication Date Title
CN110830991B (en) Secure session method and device
EP1495585B1 (en) Method and system for authenticating user of data transfer device
CN110121168B (en) Security negotiation method and device
US20200228977A1 (en) Parameter Protection Method And Device, And System
CN108632814A (en) A kind of terminal device network collocating method and system
EP4099733B1 (en) Security authentication method and apparatus, and electronic device
CN101512980A (en) Transporting management traffic through a multi-hop mesh network
CN111866867B (en) Information acquisition method and device
KR20200086721A (en) Security protection methods and devices
CN105142136B (en) A kind of method of anti-pseudo-base station attack
CN102223631B (en) Data encryption transmission method, device and system in M2M (man to machine, machine to machine and machine to man)
US20230337002A1 (en) Security context generation method and apparatus, and computer-readable storage medium
CN115767517A (en) Communication method, device and system
CN103179559A (en) Safe communication method, device and system of terminal with low cost
Jiang et al. Wireless access in vehicular environment
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
Sharma Wireless sensor network security
Mäurer et al. Advancing the Security of LDACS
CN113870622A (en) Method and system for unmanned aerial vehicle information interaction by using safety short message
CN101500231A (en) Mobile terminal, audio data processing method and system
KR20220154159A (en) Sidelink communication method of terminal where NR module and LTE module coexist in NR V2X
CN114615688B (en) Close-distance automatic configuration method between WiFi hotspot device and current access device
CN110830421A (en) Data transmission method and device
US10904929B2 (en) Secure communication system
CN109076317A (en) Verify the method and server of message legitimacy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination