ATN/IPS SECURITY APPROACH: TWO-WAY MUTUAL AUTHENTICATION, DATA INTEGRITY AND PRIVACY

被引:0
|
作者
Niraula, Madhu [1 ]
Graefe, Jonathan [2 ]
Dlouhy, Ron [2 ]
Layton, Mark [2 ]
Stevenson, Mark [2 ]
机构
[1] Rockwell Collins, Cedar Rapids, IA 52498 USA
[2] Rockwell Collins IMS, Annapolis, MD USA
关键词
TAXONOMY; ATTACKS; SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently there are various industry and regulatory activities (Airlines Electronic Engineering Committee Internet Protocol Suites (IPS) Working Group, Radio Technical Commission for Aeronautics SC-223, EUROCAE Working Group 108, and ICAO Working Group I) underway to develop the future aviation safety service Aeronautical Telecommunication Network (ATN) based on Internet Protocol Suite (IPS) IPv6, which is the selected protocol for air/ground communication in support of Air Traffic Service (ATS) safety service applications. This will provide IPv6 as an alternative to the traditional ACARS and ATN/OSI protocols for the air/ground aviation safety services network, but it also exposes the aviation safety services data communication to various cyber security threats. Data communication security plays an important role in the successful development of ATN/IPS as a next generation aviation safety service network that support ATS, ATC, AOC messages over various air/ground radio links. Security countermeasures help ensure the confidentiality, availability, and integrity of ATN/IPS systems by preventing or mitigating harm from cyber security attacks. This paper introduces the motivation and context for ATN/IPS security in terms of the aviation safety service data communication network. It describes the first fully implemented two-way authentication security, data integrity scheme for the aircraft air/ground safety service communications based on existing internet standards, specifically the Datagram Transport Layer Security (DTLS) protocol. The security approach uses Elliptical Curve Cryptography (ECC), which is the most efficient, matured, and widely accepted public key cryptography algorithm. This paper presents the DTLS implementation in the context of an air/ground system architecture and overall feasibility and the scheme's feasibility (low overhead and high interoperability). This is further demonstrated through extensive evaluation of a prototype using an existing avionics hardware platform and an existing ground system.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] AN SNR BALANCING APPROACH TO TWO-WAY RELAYING
    Havary-Nassab, Veria
    Shahbazpanahi, Shahram
    Grami, Ali
    SPAWC: 2009 IEEE 10TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, 2009, : 250 - +
  • [42] Two-way communication with adaptive data acquisition
    Ahmadi, Behzad
    Simeone, Osvaldo
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (04): : 532 - 546
  • [43] Biplot Analysis of Incomplete Two-Way Data
    Yan, Weikai
    CROP SCIENCE, 2013, 53 (01) : 48 - 57
  • [44] Two-Way Multicasting for Test Data Compression
    Lee, Lung-Jen
    Tseng, Wang-Dauh
    Chen, Wei-Shun
    PROCEEDINGS OF THE 13TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR TEST AND VERIFICATION (MTV 2012), 2012, : 60 - 64
  • [45] Secure two-way transfer of measurement data
    Hassinen, Marko
    Marttila-Kontio, Maija
    Saesmaa, Mikko
    Tervo, Heli
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 426 - +
  • [46] The analysis of the data for two-way contingency tables
    Knapp, TR
    RESEARCH IN NURSING & HEALTH, 1999, 22 (03) : 263 - 268
  • [47] Discrete and continuous models for two-way data
    Vichi, M
    CLASSIFICATION, AUTOMATION, AND NEW MEDIA, 2002, : 139 - 147
  • [48] Two-Way Communication with Adaptive Data Acquisition
    Ahmadi, Behzad
    Simeone, Osvaldo
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2159 - 2163
  • [49] Cryptography A security pillar of privacy, integrity and authenticity of data communication
    Kapoor, Bhushan
    Pandya, Pramod
    Sherif, Joseph S.
    KYBERNETES, 2011, 40 (9-10) : 1422 - 1439
  • [50] A Cognitively Inspired Approach to Two-Way Cluster Extraction from One-Way Clustered Data
    Abdullah, Ahsan
    Hussain, Amir
    COGNITIVE COMPUTATION, 2015, 7 (01) : 161 - 182