This section will discuss how to access the Silvus StreamCaster GUI for optional changes.
All Silvus radios come preconfigured and are ready to use. Changing the settings of the radio is only recommended for advanced users.
Each Silvus radio modem has a dedicated IP address consisting of 4 numbers divided by 3 dots. For example 172.20.123.123. Check your radio modem for the correct IP address.
To get access to the Silvus StreamCaster GUI, the Toughbook must be connected to the Silvus StreamCaster and both units must be powered on.
On the Toughbook open a browser. In the address bar, type in the IP address of the radio modem and press enter.
If you are experiencing any issues with the Google Chrome browser while using the GUI, changing to an “incognito” window may help.
After a few seconds, the browser should open a window with the Silvus StreamCaster GUI. Under the tab Local Radio Configuration -> RF -> Basic, you have access to the basic radio frequency configuration. Here you can set for example the Frequency, Bandwidth, or Total Transmission Power.
To function properly all changes must be applied to both the handheld radio and the DeltaQuad Evo. To save and apply changes to both, ensure that the units are powered on and connected. Choosing 'SAVE AND APPLY TO NETWORK' stores the changes in both devices, preserving them even after a reboot. 'APPLY' only stores the changes until a reboot.
The DeltaQuad Evo Tactical Edition comes with an Interference Avoidance License. When flying in areas where RF jamming is present, the system will use frequency hopping to provide the strongest link possible. The set frequency in the Basic Configuration serves as a starting point from which the system operates.
Under the tab Network Management -> Network Topology, the individual nodes and the signal strength are visible.
Under the tab Security -> Encryption, you can set the security keys.
During setup in our factory, we generate random keys which, for security reasons, are not stored anywhere. When changing the keys, make sure to save and apply the changes to both the handheld radio and the DeltaQuad Evo.
Under the tab Security -> White/Black List a white or black list can be created. A Black List can block specific nodes from the network. A white list can specify the nodes which are allowed to have access to the network.
For further reading and in-depth information, please follow this link.
The following section describes how to change the encryption of the Silvus radio network.
This guide will help you configure the Silvus radios' encryption in the DeltaQuad Evo Government (GOV) Edition according to your needs. These steps ensure secure communication and protect your data from unauthorized access and cyber threats.
The Silvus radio in the DeltaQuad Evo GOV is set up with encryption by default. DeltaQuad uses randomized encryption keys that are not written down anywhere. It is the operator's responsibility to change the radio encryption to meet the specific requirements of the operation.
Encryption is essential for securing the data transmitted between drones and ground stations. It ensures that sensitive information, such as video feeds and control commands, is protected from unauthorized access. By using encryption, you can prevent cyber threats, eavesdropping, and tampering, thereby maintaining the integrity and confidentiality of your communications.
Silvus radios support several encryption protocols, which vary in the level of security they provide:
AES 56-bit
AES 128-bit
AES 256-bit
These protocols use Advanced Encryption Standard (AES), with higher bit numbers offering stronger security. AES 256, for instance, is highly recommended for the highest level of security.
Access the Configuration Interface:
Connect to the Silvus radio through a web browser using the radio's IP address. A connection guide can be found here.
Navigate to the Security Settings:
Locate the security settings tab and click on encryption.
Select the Encryption Protocol:
Choose the desired AES encryption level (56, 128, or 256-bit) from the dropdown menu or selection box.
Generate a Wrapping and HMAC key and input Encryption key:
Click on the respective fields to generate a Wrapping and HMAC key. The system does not store these keys for security reasons. They are randomly generated based on the chosen encryption method.
Click on the field to input the Encryption key. Enter your encryption key, ensuring it meets the protocol requirements for length and complexity. The system does not store this key for security reasons.
Save and Apply Settings:
After configuring the encryption settings, ensure that you save and apply these settings not only on the device you are currently configuring but also across the entire network. This means applying and saving the settings for all radios, both ground and air units, to ensure uniform encryption across all communication links.
Testing and Verification:
Perform a communication test to ensure that the encryption is working correctly. Verify that data transmission is secure and that there are no connectivity issues.
Additional Considerations
Random Key Generation: The system can generate random keys based on the encryption method, enhancing security by preventing predictable patterns.
Non-Storage of Keys: For cybersecurity, encryption keys are not stored. This practice mitigates the risk of unauthorized access to the keys.
Regularly update and manage encryption settings to adapt to evolving security needs and maintain robust protection against cyber threats.