2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC) 2020
DOI: 10.1109/dasc50938.2020.9256746
|View full text |Cite
|
Sign up to set email alerts
|

Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS

Abstract: Growth of civil air traffic worldwide poses a great challenge for the supporting Communication, Navigation and Surveillance (CNS) infrastructure. Analogue systems have to be replaced by digital means to optimize spectrum efficiency and automation is becoming much more important to be able to handle the amount of participants in the air traffic system. As safety and security are strongly intertwined in aviation, cybersecurity is one key enabler for digitalization in civil aviation. As such we investigate mutual… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 22 publications
1
16
0
Order By: Relevance
“…A duration for the key exchange procedure of 283.74 ms for the 95th percentile was measured. This goes in line with the theoretical and simulation-based evaluations published in [37], [38]. An in-depth analysis of the security measures employed in the campaign for data broadcast over LDACS can be found in [31].…”
Section: B Applications and Securitysupporting
confidence: 79%
“…A duration for the key exchange procedure of 283.74 ms for the 95th percentile was measured. This goes in line with the theoretical and simulation-based evaluations published in [37], [38]. An in-depth analysis of the security measures employed in the campaign for data broadcast over LDACS can be found in [31].…”
Section: B Applications and Securitysupporting
confidence: 79%
“…In the experiment public keys and certificates of the ground-station and aircraft-station were bilaterally exchange via LDACS. In an operational deployment of LDACS the distribution of public keys and certificates will likely be realized via an LDACS specific public key infrastructure, as described in [14,15,16,17]. Knowing Alice's public key, Bob can verify the authenticity of the TESLA parameters and start buffering messages sent by Alice until he receives the correct key to verify their authenticity.…”
Section: Tesla Broadcast Authenticationmentioning
confidence: 99%
“…Previous security analysis of LDACS identified requirements of the cell-attachment procedure [10], [11], [13], [15]: Mutual Authentication, Perfect Forward Secrecy and Secure Key Establishment in event of an adversary or compromise of long-term keys. This requires the key establishment method to be based on ephemeral keys, where both parties contribute to the final shared secrets and the inputs are chosen freshly for every protocol run.…”
Section: Secure Ldacs Cell-attachment: Design Goalsmentioning
confidence: 99%
“…All these documents define access control, options to protect user data in transit on link layer, and protection of the control plane of the radio access technology, as a requirement to be incorporated into the Air Traffic Network (ATN)/IP-Protocol Suite (IPS) network. In previous works, threat-and risk analysis of LDACS were conducted [9], [10], a draft for an LDACS cybersecurity architecture introduced [11], [12], algorithms proposed [13], [14] and the security of the Station to Station (STS)-based Mutual Authentication and Key Establishment (MAKE) procedure of LDACS formally verified [15]. Thereby, the low data rates of aeronautical systems, which originates from low limited dedicated spectrum for civil aviation and resulting 500 kHz channel sizes for LDACS [16], is respected.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation