ATN/IPS SECURITY APPROACH: TWO-WAY MUTUAL AUTHENTICATION, DATA INTEGRITY AND PRIVACY

被引:0
|
作者
Niraula, Madhu [1 ]
Graefe, Jonathan [2 ]
Dlouhy, Ron [2 ]
Layton, Mark [2 ]
Stevenson, Mark [2 ]
机构
[1] Rockwell Collins, Cedar Rapids, IA 52498 USA
[2] Rockwell Collins IMS, Annapolis, MD USA
关键词
TAXONOMY; ATTACKS; SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently there are various industry and regulatory activities (Airlines Electronic Engineering Committee Internet Protocol Suites (IPS) Working Group, Radio Technical Commission for Aeronautics SC-223, EUROCAE Working Group 108, and ICAO Working Group I) underway to develop the future aviation safety service Aeronautical Telecommunication Network (ATN) based on Internet Protocol Suite (IPS) IPv6, which is the selected protocol for air/ground communication in support of Air Traffic Service (ATS) safety service applications. This will provide IPv6 as an alternative to the traditional ACARS and ATN/OSI protocols for the air/ground aviation safety services network, but it also exposes the aviation safety services data communication to various cyber security threats. Data communication security plays an important role in the successful development of ATN/IPS as a next generation aviation safety service network that support ATS, ATC, AOC messages over various air/ground radio links. Security countermeasures help ensure the confidentiality, availability, and integrity of ATN/IPS systems by preventing or mitigating harm from cyber security attacks. This paper introduces the motivation and context for ATN/IPS security in terms of the aviation safety service data communication network. It describes the first fully implemented two-way authentication security, data integrity scheme for the aircraft air/ground safety service communications based on existing internet standards, specifically the Datagram Transport Layer Security (DTLS) protocol. The security approach uses Elliptical Curve Cryptography (ECC), which is the most efficient, matured, and widely accepted public key cryptography algorithm. This paper presents the DTLS implementation in the context of an air/ground system architecture and overall feasibility and the scheme's feasibility (low overhead and high interoperability). This is further demonstrated through extensive evaluation of a prototype using an existing avionics hardware platform and an existing ground system.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol
    Fung, Chi-Hang Fred
    Ma, Xiongfeng
    Chau, H. F.
    Cai, Qing-yu
    PHYSICAL REVIEW A, 2012, 85 (03)
  • [32] Two new algorithms for resolution of two-way data
    Xu, J
    Guo, Z
    Liang, YZ
    Yu, RQ
    JOURNAL OF CHEMOMETRICS, 1996, 10 (01) : 63 - 76
  • [33] Production System of Platelet from iPS cells by Two-way Flow Bioreactor
    Nakagawa, Yosuke
    Ikeda, Seiichi
    Fukuda, Toshio
    Arai, Fumihito
    Nakamura, Sou
    Eto, Koji
    2012 INTERNATIONAL SYMPOSIUM ON MICRO-NANOMECHATRONICS AND HUMAN SCIENCE (MHS), 2012, : 178 - 181
  • [34] Two new algorithms for resolution of two-way data
    Xu, Jing
    Guo, Zhong
    Liang, Yi-Zeng
    Yu, Ruqin
    Journal of Chemometrics, 10 (01): : 63 - 76
  • [35] A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks
    Yu, Haitao
    Wang, Liejun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7389 - S7399
  • [36] A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks
    Haitao Yu
    Liejun Wang
    Cluster Computing, 2019, 22 : 7389 - 7399
  • [37] Interrelated two-way clustering: An unsupervised approach for gene expression data analysis
    Tang, C
    Zhang, L
    Zhang, AD
    Ramanathan, M
    2ND ANNUAL IEEE INTERNATIONAL SYMPOSIUM ON BIOINFORMATICS AND BIOENGINEERING, PROCEEDINGS, 2001, : 41 - 48
  • [38] Two-Way Biometrics-Based Authentication Scheme on Mobile Devices
    Duong-Tien Phan
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 177 - 190
  • [39] The Two-Way Trusted Authentication Mechanism of the Internet of Things for the Community Pension
    Zhou, Caiqiu
    Yang, Yuwang
    Wang, Yongjian
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 2439 - 2447
  • [40] A decidable two-way logic on data words
    Figueira, Diego
    26TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS 2011), 2011, : 365 - 374