Difference between revisions of "Messages Format"
(→Types) |
|||
Line 48: | Line 48: | ||
The cryptographic overhead during regular communication is 20 bytes (4 bytes of the counter, 16 bytes of the authentication tag), plus the necessary key exchange at the beginning of communication. | The cryptographic overhead during regular communication is 20 bytes (4 bytes of the counter, 16 bytes of the authentication tag), plus the necessary key exchange at the beginning of communication. | ||
===S-Pprzlink v2.0=== | ===S-Pprzlink v2.0=== | ||
In this case both source and destination ID are not encrypted (but are authenticated). | In this case both source and destination ID are not encrypted (but are authenticated). | ||
PPRZ-message: ABCxxxxxxxDE | |||
A PPRZ_STX (0x99) | |||
B LENGTH (A->E) | |||
C PPRZ_DATA | |||
i counter LSB 1 | |||
ii counter LSB 2 | |||
iii counter LSB 3 | |||
iv counter LSB 4 | |||
0 SOURCE (~sender_ID) | |||
1 DESTINATION (can be a broadcast ID) | |||
2 CLASS/COMPONENT | |||
bits 0-3: 16 class ID available | |||
bits 4-7: 16 component ID available | |||
3 MSG_ID | |||
4 MSG_PAYLOAD | |||
. DATA (messages.xml) | |||
i-xvi TAG | |||
D PPRZ_CHECKSUM_A (sum[B->C]) | |||
E PPRZ_CHECKSUM_B (sum[ck_a]) | |||
{|border="1" cellspacing="0" style="text-align:center" cellpadding="2%" width="70%" | {|border="1" cellspacing="0" style="text-align:center" cellpadding="2%" width="70%" | ||
Line 102: | Line 81: | ||
|1||length N (PPRZ_STX->checksum B)||style="background:orange; color:black"|Header | |1||length N (PPRZ_STX->checksum B)||style="background:orange; color:black"|Header | ||
|- | |- | ||
|2|| | |2||counter LSB 1 ||style="background:green; color:white"|Authenticated data | ||
|- | |- | ||
|3|| | |3||counter LSB 2 ||style="background:green; color:white"|Authenticated data | ||
|- | |- | ||
|4||counter LSB | |4||counter LSB 3 ||style="background:green; color:white"|Authenticated data | ||
|- | |- | ||
|5||counter LSB | |5||counter LSB 4 ||style="background:green; color:white"|Authenticated data | ||
|- | |- | ||
|6|| | |6|| source ID ||style="background:green; color:white"|Authenticated data | ||
|- | |- | ||
|7|| | |7|| destination ID ||style="background:green; color:white"|Authenticated data | ||
|- | |- | ||
|8|| class component ||style="background:yellow; color:black"|Encrypted payload | |8|| class component ||style="background:yellow; color:black"|Encrypted payload |
Revision as of 20:53, 28 December 2017
Introduction
Messages Format and how to use them
For the message definitions see http://docs.paparazziuav.org/latest/paparazzi_messages.html
Types
Paparazzi "PPRZ" standard message for direct serial connection
Pprzlink v1.0
PPRZ-message: ABCxxxxxxxDE A PPRZ_STX (0x99) B LENGTH (PPRZ_STX->PPRZ_CHECKSUM_B) C PPRZ_DATA 0 SENDER_ID 1 MSG_ID 2 MSG_PAYLOAD . DATA (messages.xml) D PPRZ_CHECKSUM_A (sum[B->C]) E PPRZ_CHECKSUM_B (sum[ck_a])
Pprzlink v2.0
Note that there is currently no explicit way to recognize whether the protocol is v1.0 or 2.0 so it has to be known before the communication.
PPRZ-message: ABCxxxxxxxDE A PPRZ_STX (0x99) B LENGTH (A->E) C PPRZ_DATA 0 SOURCE (~sender_ID) 1 DESTINATION (can be a broadcast ID) 2 CLASS/COMPONENT bits 0-3: 16 class ID available bits 4-7: 16 component ID available 3 MSG_ID 4 MSG_PAYLOAD . DATA (messages.xml) D PPRZ_CHECKSUM_A (sum[B->C]) E PPRZ_CHECKSUM_B (sum[ck_a])
Secure Paparazzi (S-PPRZ) for serial and transparent modem communication
Secure Paparazzi link (pprzlink) uses symmetric key encryption with Chacha20 cipher.
s-pprzlink uses a formally verified cryptographic library HACL* developed by the Prosecco team at INRIA Paris in collaboration with Microsoft Research, as part of Project Everest.
Because certain data have to be send in plaintext (such as the message counter), s-pprzlink uses Authenticated Encryption with Associated Data (AEAD) algorithm to authenticate such data before use. Authentication means that any unauthorized change in data is detected upon decryption. Authentication is important because if we decide to send SENDER_ID or DESTINATION_ID in plaintext - so the receiver can decide whether to decrypt the message - we don't want it to be tampered with. s-pprzlink uses a modified Galois Embedded Crypto algorithm, refer there for more details about the algorithm itself.
The cryptographic overhead during regular communication is 20 bytes (4 bytes of the counter, 16 bytes of the authentication tag), plus the necessary key exchange at the beginning of communication.
S-Pprzlink v2.0
In this case both source and destination ID are not encrypted (but are authenticated).
PPRZ-message: ABCxxxxxxxDE A PPRZ_STX (0x99) B LENGTH (A->E) C PPRZ_DATA i counter LSB 1 ii counter LSB 2 iii counter LSB 3 iv counter LSB 4 0 SOURCE (~sender_ID) 1 DESTINATION (can be a broadcast ID) 2 CLASS/COMPONENT bits 0-3: 16 class ID available bits 4-7: 16 component ID available 3 MSG_ID 4 MSG_PAYLOAD . DATA (messages.xml) i-xvi TAG D PPRZ_CHECKSUM_A (sum[B->C]) E PPRZ_CHECKSUM_B (sum[ck_a])
byte | Value | Type |
---|---|---|
0 | PPRZ_STX (0x99) | Header |
1 | length N (PPRZ_STX->checksum B) | Header |
2 | counter LSB 1 | Authenticated data |
3 | counter LSB 2 | Authenticated data |
4 | counter LSB 3 | Authenticated data |
5 | counter LSB 4 | Authenticated data |
6 | source ID | Authenticated data |
7 | destination ID | Authenticated data |
8 | class component | Encrypted payload |
9 | message ID | Encrypted payload |
10..(N-16) | (optional) message payload (0-234 bytes) | Encrypted payload |
(N-15)..(N-2) | tag (16 bytes) | Authentication tag |
N-1 | checksum A | Header |
N | checksum B | Header |
XBee API format
XBee-message: ABCDxxxxxxxE A XBEE_START (0x7E) B LENGTH_MSB (D->D) C LENGTH_LSB D XBEE_PAYLOAD 0 XBEE_TX16 (0x01) / XBEE_RX16 (0x81) 1 FRAME_ID (0) / SRC_ID_MSB 2 DEST_ID_MSB / SRC_ID_LSB 3 DEST_ID_LSB / XBEE_RSSI 4 TX16_OPTIONS (0) / RX16_OPTIONS 5 PPRZ_DATA 0 SENDER_ID 1 MSG_ID 2 MSG_PAYLOAD . DATA (messages.xml) E XBEE_CHECKSUM (sum[D->D]) ID is AC_ID for aircraft, 0x100 for ground station
Telemetry storage format for data logger
TLM-message: ABCDEFGHxxxxxxxI A PPRZ_STX (0x99) B LENGTH (H->H) C SOURCE (0=uart0, 1=uart1, 2=i2c0, ...) D TIMESTAMP_LSB (100 microsecond raster) E TIMESTAMP F TIMESTAMP G TIMESTAMP_MSB H PPRZ_DATA 0 SENDER_ID 1 MSG_ID 2 MSG_PAYLOAD . DATA (messages.xml) I CHECKSUM (sum[B->H])