ATN/IPS SECURITY APPROACH: TWO-WAY MUTUAL AUTHENTICATION, DATA INTEGRITY AND PRIVACY

被引:0
|
作者
Niraula, Madhu [1 ]
Graefe, Jonathan [2 ]
Dlouhy, Ron [2 ]
Layton, Mark [2 ]
Stevenson, Mark [2 ]
机构
[1] Rockwell Collins, Cedar Rapids, IA 52498 USA
[2] Rockwell Collins IMS, Annapolis, MD USA
关键词
TAXONOMY; ATTACKS; SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently there are various industry and regulatory activities (Airlines Electronic Engineering Committee Internet Protocol Suites (IPS) Working Group, Radio Technical Commission for Aeronautics SC-223, EUROCAE Working Group 108, and ICAO Working Group I) underway to develop the future aviation safety service Aeronautical Telecommunication Network (ATN) based on Internet Protocol Suite (IPS) IPv6, which is the selected protocol for air/ground communication in support of Air Traffic Service (ATS) safety service applications. This will provide IPv6 as an alternative to the traditional ACARS and ATN/OSI protocols for the air/ground aviation safety services network, but it also exposes the aviation safety services data communication to various cyber security threats. Data communication security plays an important role in the successful development of ATN/IPS as a next generation aviation safety service network that support ATS, ATC, AOC messages over various air/ground radio links. Security countermeasures help ensure the confidentiality, availability, and integrity of ATN/IPS systems by preventing or mitigating harm from cyber security attacks. This paper introduces the motivation and context for ATN/IPS security in terms of the aviation safety service data communication network. It describes the first fully implemented two-way authentication security, data integrity scheme for the aircraft air/ground safety service communications based on existing internet standards, specifically the Datagram Transport Layer Security (DTLS) protocol. The security approach uses Elliptical Curve Cryptography (ECC), which is the most efficient, matured, and widely accepted public key cryptography algorithm. This paper presents the DTLS implementation in the context of an air/ground system architecture and overall feasibility and the scheme's feasibility (low overhead and high interoperability). This is further demonstrated through extensive evaluation of a prototype using an existing avionics hardware platform and an existing ground system.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] An improved hash-based RFID two-way security authentication protocol and application in remote education
    Yang, Lvqing
    Wu, Qingqiang
    Bai, Youjing
    Zheng, Huiru
    Lin, Shufu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (05) : 2713 - 2720
  • [22] Two-way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk
    Huang Xingli
    Yang Huanchun
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS II, PTS 1-3, 2011, 58-60 : 573 - 578
  • [23] Two-Factor Decryption: A Better Way to Protect Data Security and Privacy
    Cui, Hui
    Paulet, Russell
    Nepal, Surya
    Yi, Xun
    Mbimbi, Butrus
    COMPUTER JOURNAL, 2021, 64 (04): : 550 - 563
  • [24] A new security and privacy on RFID mutual authentication protocol based on partial ID
    Zhang, Hui
    Hou, Chao-Huan
    Wang, Dong-Hui
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 853 - 856
  • [25] Two-way communication on bank websites in Ghana: A data triangulation approach
    Okoe, Abednego Feehi
    Boateng, Henry
    INFORMATION DEVELOPMENT, 2016, 32 (05) : 1471 - 1484
  • [26] A Modified Two-way Authentication Protocol without Server for RFID
    Lu Xin-mei
    He Lei
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2709 - +
  • [27] Research on a Two-Way One-Time Password Authentication
    Liu, Jing-Chao
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 1011 - 1014
  • [28] A TWO-WAY APPROACH IS THE ONLY WAY FORWARD FOR RECOVERY
    Benham, Jon
    AUSTRALIAN AND NEW ZEALAND JOURNAL OF PSYCHIATRY, 2011, 45 : A14 - A14
  • [29] A Robust Mutual Authentication Scheme for Data Security in Cloud Architecture
    Sarvabhatla, Mrudula
    Vorugunti, Chandra Sekhar
    2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [30] The Analysis of Two-Way Functional Data Using Two-Way Regularized Singular Value Decompositions
    Huang, Jianhua Z.
    Shen, Haipeng
    Buja, Andreas
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2009, 104 (488) : 1609 - 1620