Aeronautical communication transition from analog to digital data: A network security survey
Tài liệu tham khảo
ARINC, Arinc report 618-6 air/ground character-oriented protocol specification, 2006.
N. Smith, J. Moses, S. Romahn, P. Polson, J. Brown, M. Dunbar, E. Palmer, S. Lozito, An assessment of flight crew experiences with fans-1 ATC datalink, 2001. 4th USA/Europe Air Traffic Management R&D Seminar.
EUROCONTROL, Link 2000+ programme: Atc data link operational guidance for link 2000+ services, 2010.
H. Hering, K. Haufdauer, From analogue broadcast radio towards end-to-end communication, in: 26th Congress of the International Council of the Aeronautical Sciences ICAS 2008, 2008.
Boeing, http://www.boeing.com/commercial/cmo/, last Access 2013.
ICAO, Aeronautical communications panel (acp) wg f, need for spectrum for future aeronautical air/ground communication systems, 2006.
2006, Unifying european air transport air traffic communication plans avanti air moves forward, J. Eur. Regions Airline Assoc.
E. Darby, C. Shingledecker, Design review of the controller-pilot data link communications—build I (cpdlc-1) functionality and computer-human interface for the display system replacement, Technical Report DOT/FAA/CT-98/16, 1998.
ICAO, Manual of technical provisions for the ATN, Doc 9705, Ed 3, 2002.
C. Shingledecker, S. Giles, J. Darby, E. R, J. Pino, T.R. Hancock, Projecting the effect of cpdlc on nas capacity, in: Proc. 24th Digital Avionics Systems Conf. DASC 2005, vol. 1, 2005. http://dx.doi.org/10.1109/DASC.2005.1563321.
2006
EUROCONTROL, Communications operating concept and requirements for the future radio system, 2002.
AIRBUS, Getting to grips with data link, 2004, Flight Operations Support and Line Assistance.
ARINC, http://www.arinc.com/, Last Access 2013.
2005
2008
M. Beeby, Aviation quality cots software: reality or folly, in: The 21st, Digital Avionics Systems Conference, 2002. Proceedings. vol. 1, 2002, pp. 5D2–1–5D2–10, http://dx.doi.org/10.1109/DASC.2002.1067975.
Presagis, http://www.presagis.com/, Last Access 2013.
ICAO, Manual for the ATN using IPS standards and protocols (Doc 9896), 2008.
R.W. Murawski, S.C. Bretmersky, V.K. Konangi, Evaluation of vdl modes in the en-route domain, in: Proc. 23rd Digital Avionics Systems Conf. DASC 04, vol. 1, 2004, http://dx.doi.org/10.1109/DASC.2004.1391232.
W.H. Jones, M. de La Chapelle, Connexion by boeing-broadband satellite communication system for mobile platforms, in: Proc. Communications for Network-Centric Operations: Creating the Information Force. IEEE Military Communications Conf. MILCOM 2001, vol. 2, 2001, pp. 755–758. http://dx.doi.org/10.1109/MILCOM.2001.985939.
Panasonic, http://www.panasonic.aero/products/globalcomm.aspx, Last Access 2013.
Onair, http://www.onair.aero/, Last Access 2013.
2005
Newsky, http://www.newsky-fp6.eu/, Last Access 2013.
SANDRA, http://www.sandra-project.eu/2012/, Last Access 2013.
ANASTASIA, http://www.anastasia-fp6.org/, Last Access 2013.
IATA, World air transport statistics (wats), 53th edition, 2009.
Douligeris, 2007, Pki systems, 409
Alford, 2001, The problem with aviation cots, vol. 16, 33
R. Shirey, Internet security glossary, Version 2, RFC 4949 (Informational), 2007. http://www.ietf.org/rfc/rfc4949.txt.
Diffie, 1976, New directions in cryptography, IEEE Trans. Inform. Theory, 22, 644, 10.1109/TIT.1976.1055638
NIST, Federal information processing standards publication (fips pubs) 46–3, data encryption standard (des), 1999, Reaffirmed.
NIST, Federal information processing standards publication (fips pubs) 197, announcing the advanced encryption standard (aes), 2001.
Rivest, 1978, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21, 120, 10.1145/359340.359342
ARINC, Draft 04 (strawman) of aeec project paper 823 datalink security, part 2: key management, 2007.
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile, RFC 5280 (Proposed Standard), 2008, http://www.ietf.org/rfc/rfc5280.txt.
ATA, Ata spec 42, aviation industry standards for digitial information security, revision 2009.1, 2009.
NIST, Federal information processing standards publication (fips- pubs) 180–1, announcing the standard for secure hash standard, 1995.
D. Dolev, A.C. Yao, On the security of public key protocols, in: Proc. 22nd Annual Symp. Foundations of Computer Science SFCS ’81, 1981, pp. 350–357.
Ainoline, http://www.ainonline.com/aviation-news/ainalerts/2011-01-25/newark-airport-gbas-vulnerable-truckers-gps-jammers, Last Access 2013.
D. Getachew, J.H. Griner, An elliptic curve based authentication protocol for controller-pilot data link communications, ICNS Conference & Workshop, 2005.
Needham, 1978, Using encryption for authentication in large networks of computers, Commun. ACM, 21, 993, 10.1145/359657.359659
Lowe, 1995, An attack on the Needham–Schroeder public-key authentication protocol, Inform. Process. Lett., 56, 131, 10.1016/0020-0190(95)00144-2
U.D. of Justice, Juvenile computer hacker cuts off faa tower at regional airport, 1998, http://www.cybercrime.gov/juvenilepld.html.
2009
EUROCAE, Wg72 website, http://www.eurocae.net/working-groups/wg-list/41-wg-72.html, Last Access 2013.
EUROCAE, Wg82 website, http://www.eurocae.net/working-groups/wg-list/50-wg-82.html, Last Access 2013.
RTCA, Sc216 website, http://www.rtca.org/comm/Committee.cfm?id=76, Last Access 2013.
2010
RTCA, Sc223 website, http://www.rtca.org/comm/Committee.cfm?id=133, Last Access 2013.
2013
2013
ARINC, Draft 1 of ARINC project paper 823 datalink security, part 1: ACARS message security, 2007.
M. Olive, R. Oishi, S. Arentz, Commercial aircraft information security : an overview of ARINC report 811, 2006, pp. 1–12, http://dx.doi.org/10.1109/DASC.2006.313761.
S. Kent, K. Seo, Security architecture for the internet protocol, RFC 4301 (Proposed Standard), 2005. http://www.ietf.org/rfc/rfc4301.txt.
D. Harkins, D. Carrel, The internet key exchange (ike), RFC 2409 (Proposed Standard), 1998. http://www.ietf.org/rfc/rfc2409.txt, obsoleted by RFC 4306, updated by RFC 4109.
V. Patel, T. McParland, Enhancements to security guidance, ICAO Working paper, Aeronautical Communication Panel, Working Group I, 2008.
V. Patel, T. McParland, Application of mobile ip and proxy mobile ip security, ICAO Working paper, Aeronautical Communication Panel, Working Group I, 2008.
V. Patel, T. McParland, Updated security requirements for the manual for the atn using ips standards and protocols, ICAO Working paper, Aeronautical Communication Panel, Working Group I, 2008.
2006
E.C. EUROCONTROL, First sesar release 2011, 2011.
FAA, Faa’s nextgen implementation plan, 2011.
R. Koelle, M. Hawley, Sesar security 2020: how to embed and assure security in system-of-systems engineering, in: Integrated Communications, Navigation and Surveillance Conference (ICNS), 2012, 2012, pp. E8-1–E8-11. http://dx.doi.org/10.1109/ICNSurv.2012.6218393.
STAR, http://www.ist-star.eu/, Last Access 2013.
CEN, http://www.nl.din.de/cmd?level=tpl-proj-detailansicht&committeeid=54739083&projid=154798156&bcrumblevel=3&languageid=en. Last Access Jan. 2013., Last Access 2013.
P. for European Air Traffic Management Standardization, Air traffic management—information security for organizations supporting civil aviation operations, 2012.
ECAC, http://www.ecac-ceac.org, Last Access 2013.
JCG, http://www.ataebiz.org/home, Last Access 2013.
NIS, http://www.aviation-ia.com/aeec/projects/nis/index.html, Last Access 2013.
ICAO, Wgi website, http://legacy.icao.int/anb/panels/acp/wgmeetinglist.cfm?WGID=26, Last Access 2013.
ICAO, Wgm website, http://legacy.icao.int/anb/panels/acp/wgmeetinglist.cfm?WGID=4, Last Access 2013.
ICAO, Wgs website, http://legacy.icao.int/anb/panels/acp/wgmeetinglist.cfm?WGID=28, Last Access 2013.
SESAR, Wp14 website,http://www.sesarju.eu/programme/workpackages/wp-14-swim-technical-architecture-201, Last Access 2013.
H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for message authentication, RFC 2104 (Informational), 1997. http://www.ietf.org/rfc/rfc2104.txt.
T. McParland, V. Patel, W. Hughes, Securing air–ground communications, in: Proc. of the 20th DASC Digital Avionics Systems Conf., vol. 2, 2001, pp. 7A7/1–7A7/9 Vol.2. http://dx.doi.org/10.1109/DASC.2001.964187.
M.L. Olive, Efficient datalink security in a bandwidth-limited mobile environment—an overview of the aeronautical telecommunications network (atn) security concept, in: Proc. DASC Digital Avionics Systems The 20th Conf, vol. 2, 2001. http://dx.doi.org/10.1109/DASC.2001.964255.
Robinson, 2007, Electronic distribution of airplane software and the impact of information security on airplane safety, International Conference on Computer Safety, Reliability and Security (Safecomp), 4680, 28, 10.1007/978-3-540-75101-4_3
R. Robinson, M. Li, S.A. Lintelman, K. Sampigethaya, R. Poovendran, D. von Oheimb, J.-U. Buauer, Impact of public key enabled applications on the operation and maintenance of commercial airplanes, AIAA Aviation Technology, Integration and Operations (ATIO) Conference, 2007.
ISO, ISO/IEC 15408: Common criteria for information technology security evaluation, 1999.
D. v Oheimb, M. Maidl, R. Robinson, Security architecture and formal analysis of an airplane software distribution system, in: AIAA (Ed.), 26th Congress of the International Council of the Aeronautical Sciences (ICAS), Proceedings on CD-ROM available from http://[email protected], 2008, pp. 1–12. http://ddvo.net/papers/ICAS08.html.
T. Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.2, RFC 5246 (proposed standard), 2008. http://www.ietf.org/rfc/rfc5246.txt, updated by RFC 5746.
B. Stephens, Security architecture for aeronautical networks, vol. 2, 2004, pp. 8.E.2–81–19.
C.A. Wargo, C. Dhas, Security considerations for the e-enabled aircraft, in: Proceeding of the IEEE Aerospace Conf, vol. 4, 2003. http://dx.doi.org/10.1109/AERO.2003.1235083.
J. Postel, User datagram protocol, RFC 768 (Standard), 1980. http://www.ietf.org/rfc/rfc768.txt.
M. Ehammer, T. Graupl, C.H. Rokitansky, T. Brikey, Security consideration for ip based aeronautical networks, in: Proc. IEEE/AIAA 27th Digital Avionics Systems Conference DASC 2008, 2008, pp. 2.E.1–1–2.E.1–13. http://dx.doi.org/10.1109/DASC.2008.4702790.
M. Ali, R. Bhagavathula, R. Pendse, Airplane data networks and security issues, in: IEEE Aerospace and Electronic Systems Magazine, vol. 20, no. 6, pp. 3, 8; vol. 2, 2005, pp. 8.E.1–81–12.
P. Pillai, Y.-F. Hu, AAA framework for aeronautical passenger multicast communication, in: Satellite and Space Communications, 2009. IWSSC 2009. International Workshop on, 2009, pp. 130–134. http://dx.doi.org/10.1109/IWSSC.2009.5286404.
V. Fajardo, J. Arkko, J. Loughney, G. Zorn, Diameter base protocol, RFC 6733 (Proposed Standard), 2012. http://www.ietf.org/rfc/rfc6733.txt.
P. Pillai, Y.-F. Hu, Performance analysis of EAP methods used as gdoi phase 1 for ip multicast on airplanes, in: Advanced Information Networking and Applications Workshops, 2009. WAINA ’09. International Conference on, 2009, pp. 433–438. http://dx.doi.org/10.1109/WAINA.2009.106.
P. Pillai, H. Yim Fun, An AAA framework for IP multicast communication in next generation networks, Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms, 2009. http://dx.doi.org/10.4018/978-1-60566-108-7.ch003.
Lacamera, 2007, Pepsal: a performance enhancing proxy for TCP satellite connections for internetworking and resource management in satellite systems, IEEE Aerosp. Electron. Syst. Mag., 22
Thanthry, 2006, Security, internet connectivity and aircraft data networks, IEEE Aerosp. Electron. Syst. Mag., 21, 3, 10.1109/MAES.2006.284351
H. Cruickshank, N. Bhutta, J. Ashworth, M. Moseley, Multilayer IPSec (ML-IPSec) protocol design for improved security performance over satellites, in: 17th Ka and Broadband Communications, Navigation and Earth Observation Conference, 2011. http://epubs.surrey.ac.uk/745937/.
M. Luglio, C. Roseti, Network security and performance evaluation of ML-IPSec over satellitenetworks, in: Ka and Broadband Communication Conference, 2006.
S. Iyengar, H. Cruickshank, P. Pillai, G. Fairhurst, L. Duquerroy, Security requirements for IP over satellite DVB networks, in: Proc. 16th IST Mobile and Wireless Communications Summit, 2007, pp. 1–6. http://dx.doi.org/10.1109/ISTMWC.2007.4299224.
L. Duquerroy, S. Josset, O. Alphand, P. Berthou, T. Gayraud, SatIPSec: an optimized solution for securing multicast and unicast satellite transmissions, in: 22nd AIAA International Communications Satellite Systems Conference (ICSSC), Monterey (USA), 2004, pp. 1–11.
ETSI, Digital video broadcasting (dvb); interaction channel for satellite distribution systems, en 301 790, 2009.
H. Cruickshank, L. Liang, P. Pillai, M. Noisternig, B. Collini-Nocker, G. Fairhurst, Unified link layer security design for ip encapsulation using unidirectional lightweight encapsulation over satellites, in: 27th IET and AIAA International Communications Satellite Systems Conference (ICSSC 2009), 2009, pp. 113–120.
M. Noisternig, B. Collini-Nocker, P. Pillai, L. Liang, H. Cruickshank, Transmitter and receiver processing specification for a unified ule security extension, in: Satellite and Space Communications, 2009. IWSSC 2009. International Workshop on, 2009, pp. 115–119.
P. Pillai, Y.-F. Hu, Design and analysis of secure transmission of ip over DVB-S/RCS satellite systems, in: Wireless and Optical Communications Networks, 2006 IFIP International Conference on, 2006, pp. 231–236.
A. Salam, M. Luglio, C. Roseti, F. Zampognaro, Dvb-rcs security framework for ULE-based encapsulation, in: Wireless Communications and Mobile Computing Conference (IWCMC), 2013, 9th International, 2013, pp. 131–136.
Cruickshank, 2005, Securing multicast in dvb-rcs satellite systems, IEEE Wirel. Commun., 12, 38, 10.1109/MWC.2005.1522103
F. Besse, F. Garcia, A. Pirovano, J. Radzik, Wireless adhoc network access for aeronautical communications, in: Proceedings of 2010 AIAA International Communications Satellite Systems Conference (ICSSC), 2010, pp. 23–30.
H.D. Tu, S. Shimamoto, A proposal of relaying data in aeronautical communication for oceanic flight routes employing mobile ad-hoc network, in: Proc. First Asian Conf. Intelligent Information and Database Systems ACIIDS 2009, 2009, pp. 436–441. http://dx.doi.org/10.1109/ACIIDS.2009.91.
D. Medina, F. Hoffmann, S. Ayaz, C.-H. Rokitansky, Feasibility of an aeronautical mobile ad hoc network over the north atlantic corridor, in: Proc. 5th Annual IEEE Communications Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks SECON’08, 2008, pp. 109–116. http://dx.doi.org/10.1109/SAHCN.2008.23.
S. Hyeon, K.-I. Kim, S. Yang, A new geographic routing protocol for aircraft ad hoc networks, in: Proc. IEEE/AIAA 29th Digital Avionics Systems Conf. (DASC), 2010. http://dx.doi.org/10.1109/DASC.2010.5655476.
K. Peters, A. Jabbar, E.K. Cetinkaya, J.P.G. Sterbenz, A geographical routing protocol for highly-dynamic aeronautical networks, in: Proc. IEEE Wireless Communications and Networking Conf. (WCNC), 2011, pp. 492–497. http://dx.doi.org/10.1109/WCNC.2011.5779182.
M. Iordanakis, G. Dilintas, Ad-hoc routing protocol for aeronautical mobile ad-hoc networks, in: Proceedings of the 5th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), 2006.
Sampigethaya, 2008, Security of aircraft ad hoc networks in the next-generation air transportation system, AIAA Aviation Technology, Integration and Operations (ATIO)
M. Iordanakis, G. Dilintas, ARPAM routing protocol vulnerabilities in aeronautical mobile ad hoc networks, in: 2nd International Scientific Conference eRA, 2007.
A. Karmarkar, L. Martin, Aviation communication infrastructure security, in: Integrated Communications, Navigation and Surveillance Conference (ICNS), 2012, 2012, pp. E7–1–E7–9. http://dx.doi.org/10.1109/ICNSurv.2012.6218392.
IEEE, 802.16 website, http://www.ieee802.org/16/, Last Access 2013.
S. Wilson, The network security architecture and possible safety benefits of the aeromacs network, in: Proceedings of 2011 Integrated Communications Navigation and Surveillance (ICNS) Conference, 2011.
NIST, Recommendation for block cipher modes of operation: the CMAC mode for authentication, NIST special publication 800–38b, 2005.
C. Shue, M. Gupta, S. Myers, Ipsec: Performance analysis and enhancements, in: Communications, 2007. ICC’07. IEEE International Conference on, 2007, pp. 1527–1532. http://dx.doi.org/10.1109/ICC.2007.256.
Xenakis, 2006, A generic characterization of the overheads imposed by {IPsec} and associated cryptographic algorithms, Computer Networks, 50, 3225, 10.1016/j.comnet.2005.12.005
Kolias, 2013, Attacks and countermeasures on 802.16: analysis and assessment, Communications Surveys Tutorials, IEEE, 15, 487, 10.1109/SURV.2012.021312.00138
F. Schreckenbach, Newsky long term concept evolution for network transformation, deliverable d07, 2009.
C. Niebla, N. Diaz, S. Scalise, C. Kissling, Dvb-s2/rcs suitability for the provision of air traffic management services, in: Satellite and Space Communications, 2006 International Workshop on, 2006, pp. 88–92. http://dx.doi.org/10.1109/IWSSC.2006.255998.
S. Kent, IP Authentication Header, RFC 4302 (Proposed Standard), 2005. http://www.ietf.org/rfc/rfc4302.txt.
Stephens, 2006, System-wide information management (swim) demonstration security architecture, 1
O. Elkeelany, M.M. Matalgah, K.P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, J. Qaddour, Performance analysis of ipsec protocol: encryption and authentication, in: Proc. IEEE Int. Conf. Communications ICC 2002, vol. 2, 2002, pp. 1164–1168. http://dx.doi.org/10.1109/ICC.2002.997033.
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, S.C. Shantz, Sizzle: a standards-based end-to-end security architecture for the embedded internet, in: Proc. Third IEEE Int. Conf. Pervasive Computing and Communications PerCom 2005, 2005, pp. 247–256. http://dx.doi.org/10.1109/PERCOM.2005.41.
W. Liang, W. Wang, A quantitative study of authentication and QOS in wireless ip networks, in: Proc. IEEE 24th Annual Joint Conf. of the IEEE Computer and Communications Societies INFOCOM 2005, vol. 2, 2005, pp. 1478–1489. http://dx.doi.org/10.1109/INFCOM.2005.1498383.
Sampigethaya, 2011, Future e-enabled aircraft communications and security: the next 20 years and beyond, Proceedings of the IEEE, 99, 2040, 10.1109/JPROC.2011.2162209
A. Costin, A. Francillon, Ghost in the air(traffic): on insecurity of ads-b protocol and practical attacks on ads-b devices, in: USA BlackHat 2012, 2012.
McCallie, 2011, Security analysis of the ads-b implementation in the next generation air transportation system, Int. J. Crit. Infrastruct. Prot., 4, 78, 10.1016/j.ijcip.2011.06.001
R. Jain, F. Templin, K.-S. Yin, Analysis of l-band digital aeronautical communication systems: L-dacs1 and l-dacs2, in: Proc. IEEE Aerospace Conf, 2011, pp. 1–10. http://dx.doi.org/10.1109/AERO.2011.5747378.
Srivastava, 2005, Cross-layer design: a survey and the road ahead, IEEE Commun. Mag., 43, 112, 10.1109/MCOM.2005.1561928
ISO, Iso/iec 27005: Information technology, information security techniques, information security risk management, 2008.
J. Nigringy, K. Phaltankar, Identity assurance in commercial aviation faciliated through a trusted third party hub, (2007). Position paper, Exostar, October, 2007.