Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

08/14/2016
by   Raja Naeem Akram, et al.
0

The notion of Integrated Modular Avionics (IMA) refers to inter-connected pieces of avionics equipment supported by a wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically secured so that a malicious user cannot access them directly, then this enforces (at least partially) the security of the network. However, substituting the wired network with a wireless network - which in this context is referred to as an Avionics Wireless Network (AWN) - brings a number of new challenges related to assurance, reliability, and security. The AWN thus has to ensure that it provides at least the required security and safety levels offered by the equivalent wired network. Providing a wired-equivalent security for a communication channel requires the setting up of a strong, secure (encrypted) channel between the entities that are connected to the AWN. In this paper, we propose three approaches to establish such a secure channel based on (i) pre-shared keys, (ii) trusted key distribution, and (iii) key-sharing protocols. For each of these approaches, we present two representative protocol variants. These protocols are then implemented as part of a demo AWN and they are then compared based on performance measurements. Most importantly, we have evaluated these protocols based on security and operational requirements that we define in this paper for an AWN.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/14/2016

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

Avionics networks rely on a set of stringent reliability and safety requ...
research
11/18/2020

Experimental implementation of secure anonymous protocols on an eight-user quantum network

Anonymity in networked communication is vital for many privacy-preservin...
research
04/06/2020

Security Analysis and Design for TAGA: a Touch and Go Assistant in the Aerospace Domain

There is currently a drive in the aerospace domain to introduce machine ...
research
02/23/2023

A Survey of Secure Computation Using Trusted Execution Environments

As an essential technology underpinning trusted computing, the trusted e...
research
06/08/2018

(In)Secure Configuration Practices of WPA2 Enterprise Supplicants

WPA2 Enterprise is a fundamental technology for secure communication in ...
research
09/23/2019

SIVSHM: Secure Inter-VM Shared Memory

With wide spread acceptance of virtualization, virtual machines (VMs) fi...
research
04/09/2021

Secret Key Distribution Protocols Based on Self-Powered Timekeeping Devices

In this paper, we present novel secret key distribution protocols using ...

Please sign up or login with your details

Forgot password? Click here to reset