2008 Spring CCSDS meeting ( Washington, USA ) SMWG 1 CCSDS Service Management Validation Test Quick Report 12. March 2008 JAXA YAGI Nobuhiro/SUZUKI Kiyohisa.

Slides:



Advertisements
Similar presentations
CCSDS Cross Support Services Issue 0.1 October, 2008 Takahiro Yamada, JAXA/ISAS Peter Shames, NASA/JPL.
Advertisements

SGSS Extensions to and Modifications of CCSDS Space Communication Cross Support Service Management October 2012 John Pietras Global Science and.
1 24 April 2009 SMWG SMWG Closing Report Colorado Springs, Colorado, USA 24 April 2009.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Folie 1 Service Oriented Architecture - Prototyping study - DLR/GSOC Author: S.Gully.
Principles of Information Security, 2nd edition1 Cryptography.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
LSU 07/07/2004Communication1 Communication & Documentation Project Management Unit – Lecture 8.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CSSM Meeting Summary Fall 2012 Meetings 15 – 18 October E. Barkley Chair (NASA/JPL) C. Haddow Co-Chair (ESA/ESOC) Cleveland, Ohio, USA.
Secure Electronic Transaction (SET)
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
1 CROSS SUPPORT SERVICE ARCHITECTURE Takahiro Yamada (JAXA/ISAS) CCSDS Meeting, Heppenheim, Germany 2 October 2007.
ESTEC, Noordwijk, Netherlands 27 Oct 2009 SERVICE ARCHITECTURE FOR SPACE -- BOF 1.
SMWG-SRN-01 SMWG Iterim Meetings June JAXA SLE-SM/UM Prototype Interoperation Coordination Takashi Asama Katsuji Miyashita
SLE-SM Refactoring Proposal Scope –Allow inclusion of services or modifications to existing ones without having to reedit the entire SLE-SM book. Proposal.
Institutsbezeichnung: Quellenangabe 1 CCSDS MANAGEMENT COUNCIL Canadian Space Agency St-Hubert, Quebec, Canada May 2004 DLR Report Martin Pilgram,
CSSM Meeting Summary CCSDS CSSM Technical Meetings London, UK 10 – 14 November 2014.
CSSM Meeting Summary CCSDS CSSM Technical Meetings San Antonio, Texas, USA 28 – 31 October 2013.
1 ProposeServicePackage (PSP) Operation SLE-SM Red-1 RID GSFC-01-JP John Pietras.
Delta-DOR SIG: Report of the Fall 2007 Meeting Heppenheim, Germany October 5th, 2007 Roberto Maddè ESA/ESOC
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
2010 Fall CCSDS meeting SMWG UK ) 1 Prototype Test Coordination for the SCCS Service Management (B-1) 26th October, 2010 JAXA ASAMA
 Communication Tasks  Protocols  Protocol Architecture  Characteristics of a Protocol.
DRMS GenComm – Goes What: GenComm can be accessed via ( address changed Mar 2010) Address:
Panel P1J: Navigation Data April 2003 CCSDS P1J FINAL REPORT Spring Meeting, ESA/ESTEC, Netherlands Dates: April 1-4, 2003 Felipe Flores-Amaya NASA/GSFC/Code.
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
2011 Fall CCSDS meeting SMWG 1 JAXA Prototype Test Report for the SCCS Service Management (B-1) 3rd November, 2011 JAXA ASAMA
1 ROAD MAP OF THE CCSDS ARCHITECTURE WORKING GROUP (AWG) Draft, Issue March 2003 Takahiro Yamada, Chair, AWG.
Second Generation Electronic Filing Specifications Legal XML Court Filing Committee April 26, 2004.
Ajh January 2007 CCSDS “Books” Adrian J. Hooke CMC Meeting, Colorado Springs 26 January 2007.
Pretty Good Privacy (PGP) Security for Electronic .
November MOIMS AREA PLENARY NAVIGATION WG REPORT November 2004 CONSULTATIVE COMMITTEE FOR SPACE DATA SYSTEMS.
Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully.
Cross Support Service Management Overview Nicolas Champsavoir DCT/PS/SSC CCSDS – CSS Area Cross Support Services ex-SLE Service Management.
CSTS File Transfer Service CS File Transfer Specification – Initial Discussions IOAG Service Catalogue #1 Scope Candidate Applications File Content.
2009 Spring CCSDS meeting ( Colorado Springs,USA ) SMWG 1 Validation Test Coordination for the SCCS Service Management (R-3.4) 20. April 2009 JAXA YAGI.
SMWG Closing Report Erik Barkley Chair, SMWG Interim Meeting Greenbelt, MD, USA June 2007 Draft 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CSS-SM Refactoring Proposal Scope –Allow inclusion of services or modifications to existing ones without having to reedit the entire CSS-SM book. Objectives.
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Delta-DOR SIG Minutes of the meeting Heppenheim, Germany October 2nd, 2007 Roberto Maddè ESA/ESOC
SMWG-JAXA April JAXA SLE-SM/UM Prototype Implementation Status Nobuhiro Yagi 25.April.2007 Telecon.
1 SMWG Service Management Book Refactoring Report Anthony Crowson Colin Haddow October 2009, ESTEC October 15, 2008.
1 12 March 2008 JPL/DSN/CSSXP Overview and Findings JPL/DSN/CSSXP Overview and Findings Crystal City, USA 12 March 2008 Erik Barkley (JPL)
The Consultative Committee for Space Data Systems 1 JAXA CCSDS Status April 12 – 13, 2005 Kaneaki Narita Consolidated Space Tracking and Data Acquisition.
Panel P1J: Navigation Data April 2002 CCSDS P1J Status Report Spring Meeting, ESA/ESOC, Darmstadt, Germany Dates: April 8 – 11, 2002 Felipe Flores-Amaya.
01-05 October 2007 Heppenheim, Germany eb - 1 SMWG Closing Plenary Report Fall 2007 Meeting Erik Barkley 5 October 2007.
1 Space Communications Cross Support Architecture WG: Charter and Work Plan April, 2009 Colorado Springs, CO, USA Takahiro Yamada, JAXA/ISAS.
CSA WG Meeting 17 May 2011 Page 1 Berlin, Germany CSA WG Service Agreement Status Prepared by Hugh Kelliher Space ConneXions Limited
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
DSN CCSDS SLE SM Prototype Plan Erik Barkley December 2006.
CMC meeting, 23 October, 2008 Page 1 JAXA CCSDS Status October, 2008 CMC Meeting DIN, Berlin, Germany Kaneaki Narita JAXA CCSDS Secretary Office.
National Aeronautics & Space Administration European Space Agency & 1 Modulation and Coding: Draft IOAG Resolutions to CCSDS September 9, 2008 Les Deutsch.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Fall Meeting, November 11, 2015 Paul Pechkam, JPL/NASA
CMC meeting, Nov., 2009 Page 1 JAXA CCSDS Status November, 2009 ESA/ESTEC Noordwijk, Netherlands Kaneaki Narita JAXA CCSDS Secretary Office.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
SLE-SM Briefing 12 March 2008 Page 1 Arlington, VA Space Link Extension (SLE) Cross Support Services Presented by Hugh Kelliher Director Space ConneXions.
Prototype Interoperation Coordination
e-Health Platform End 2 End encryption
CCSDS P1J FINAL REPORT Spring Meeting, ESA/ESTEC, Netherlands Dates: April 1-4, 2003 Felipe Flores-Amaya NASA/GSFC/Code 450/Code 572 April 2003.
JAXA CCSDS Secretary Office
Presentation transcript:

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 1 CCSDS Service Management Validation Test Quick Report 12. March 2008 JAXA YAGI Nobuhiro/SUZUKI Kiyohisa

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 2 Contents 1 Background 2 Objectives 3 Test Procedure 3-1 Interface Test 3-2 Test Tracking 4 Test Result 4-1 Interface Test Security Data Compression 4-2 Test Tracking

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 3 1 . Background Interoperability test activity by participant agencies of the CCSDS to validate the Service Management was determined at a meeting of the IOAG-10 on October, JPL and JAXA agreed to develop the following prototypes based on the CCSDS Service Management(R-1) Specification and validate the effectiveness of information and procedure exchanged by the Service Management to assured and control required resources for the spacecraft mission operations. - JPL : The development of the SLE SM service-provider prototype - JAXA/Tsukuba : The development of the SLE SM service-user prototype 2. Objectives Primary Objectives - Validation of the SLE SM standard via prototyping - Demonstration of SM interoperability across JPL and JAXA. Specifically; - Validate demonstration scenario - Validate service request exchange protocol - Gain experience in application of security techniques

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 4 3. Test Procedure 3-1. Interface test This test was conducted to verify the SLE-SM interface between service- provider prototype and service-user prototype. SLE-SM message exchange was handled by SMTP. In this test, the following specification and schema were applied to the service-provider prototype and the service-user prototype. -SPACE LINK EXTENSION SERVICE MANAGEMENT SERVICE SPECIFICATION (CCSDS R-1) -Service Management Schema File Set V P1 Figure 3-1Interface TEST Configuration SLESM Service-provider Prototype (CSSXP) JPL Internet JAXA/Tsukuba a SLESM Service-user Prototype (UMR-1) SLE-SM message exchanged by SMTP

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 5 SM ServiceOperationsJPLJAXAInterface test Service AgreementQuery Service AgreementQSAXXX Trajectory Prediction Add Trajectory PredictionATPXXX Delete Trajectory PredictionDTPXXX Query Trajectory PredictionQTPXN/A Configuration Profile Add Carrier ProfileACPXXX Delete Carrier ProfileDCPXXX Query Carrier ProfileQCPXXX Add Event ProfileAEPN/A Delete Event ProfileDEPN/A Query Event ProfileQEPN/A Service Package Create Service PackageCSPXXX Delete Service PackageDSPXXX Select Alternate ScenarioSASXN/A Apply New TrajectoryANTXN/A Query Service PackageQSPXXX Replace Service PackageRSPXN/A Service Package CancelledSPCXXX Service Package ModifiedSPMN/A Table 3-1 difference of Implemented service management operations and Interface test operations

2008 Spring CCSDS meeting ( Washington, USA ) SMWG Test tracking Test Tracking was conducted to verify the end to end interface and procedures of SLE transfer service utilization by SLE-SM Red-1 coordination. In the test tracking, JPL and JAXA used the JAXA’s “SELENE” spacecraft which is in the lunar orbit. Test tracking outline Service request was sent from the SLE-SM service-user prototype”UMR-1” at JAXA/Tsukuba to the JPL SLE-SM service-provider prototype “CSSXP”. JPL/DSN received return data from the SELENE compliant with the service request, and then transmitted these data to JAXA/Sagamihara using SLE transfer service (RAF). JAXA/Sagamihara checked the received date by the SELENE control system.

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 7 Figure 3-2 Test Tracking Configuration

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 8 SM ServiceOperationsJPLJAXA Interface Test Test tracking Service Agreement Query Service Agreement QSAXXXX Trajectory Prediction Add Trajectory Prediction ATPXXXX Delete Trajectory Prediction DTPXXX Configuration Profile Add Carrier ProfileACPXXXX Delete Carrier Profile DCPXXX Query Carrier ProfileQCPXXX Service Package Create Service Package CSPXXXX Delete Service Package DSPXXX Query Service PackageQSPXXX Service Package Cancelled SPCXXX Table 3-2 difference of Implemented service management operations and Test tracking operations

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 9 4. Test Result 4-1. Interface test The structure of service management data was XML-based text files. These were transferred as attached files on s using the protocol SMTP between UMR-1 and CSSXP. The rules of exchanged s are as follows: No.ItemRules 1 Subject:The following subjects are accepted. SLESM SleServiceManagement sleSmResponse sleExceptionMessage sleSmError 2 Content-Type:text/plain 3 Body of message:Not limited 4 Character:ISO-2022-jp or ASCII 5 Attached file:Only one file per one message Table 4 ‑ 1 Rules of Structure

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 10 SM ServiceOperationsJPLJAXA Interface test Result Service Agreement Query Service AgreementQSAXXX good Trajectory Prediction Add Trajectory PredictionATPXXX good Delete Trajectory PredictionDTPXXX good Query Trajectory PredictionQTPXN/A - Configuration Profile Add Carrier ProfileACPXXX good Delete Carrier ProfileDCPXXX good Query Carrier ProfileQCPXXX good Add Event ProfileAEPN/A - Delete Event ProfileDEPN/A- Query Event ProfileQEPN/A- Service Package Create Service PackageCSPXXX good Delete Service PackageDSPXXX good Select Alternate ScenarioSASXN/A- Apply New TrajectoryANTXN/A- Query Service PackageQSPXXX good Replace Service PackageRSPXN/A- Service Package CancelledSPCXXX good Service Package ModifiedSPMN/A- Table 4-2 result of Interface test

2008 Spring CCSDS meeting ( Washington, USA ) SMWG Security This section shows the method of security implementation from the technical point of view, and these was based on the agreement between JAXA/Tsukuba and JPL. a. SCOPE JAXA suggested an assumption to satisfy the following items. spoofing defacing sniffing At first we considered within the range of W3C of Recommendation (red-1) appendix, based on that conditions, and we proposed the following coverage of security in the prototype. ItemsImplementContent of security Security (i.e. Encryption, Digital Signature) not applyAll parameters are to be written in the attached file, and any parameter information is not set to the mail text at all. XML Encryption Syntax and Processing applyXML is encrypted using AES128 and RSA (Ver. 1.5). The data leakage to the third person can be prevented by the encryption. As it is not possible to decrypt by the third person, the defacing and the spoofing can be prevented. The public keys are exchanged each other beforehand. XML Signature Syntax and Processing not apply XML Key Management Specification not apply Table 4-3 Implementation of Encryption

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 12 b. IMPLEMENTATION FOR XML ENCRYPTION In the XML encryption, the following methods were used. XML data was encrypted using Symmetric Key. The encrypt key was generated by AES128 (128bit of the AES method) at every XML making. The encrypt key was wrapped by using the public key (RSA version 1.5) which were exchanged each other beforehand, and was stored in KeyInfo. The Key Encrypted Key (KEK) was mutually generated as a symmetric key beforehand. Only public keys were exchanged each other beforehand. The receiver decrypts using a private key. Figure 4-1 Exchange of “ Public Key ”

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 13 Sender 1.Generate symmetric key (AES 128). 2.“Cipher Data” was encrypted by using “Encrypt Key” from XML data. 3.“KeyInfo” was encrypted by using receiver’s “Public Key” from “Encrypt Key”. 4.“Encrypted XML” was generated from “CipherData” and “KeyInfo”. Receiver 5.“KeyInfo” and “Cipher Data” were detected from received “Encrypted XML”. 6.“Encrypt Key” was decrypted by using “Private Key” from “KeyInfo”. 7.XML data was decrypted from “Cipher Data” by using “Encrypt Key”. Figure 4 ‑ 2 Process Flow of Encrypted XML data Exchange

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 14 c. SCOPE OF XML ENCRYPTION In the XML encryption, the scope of encryption was all items excluded SleSmDocument and SleSmMessageSet. Both items of SleSmDocument and SleSmMessageSet were not encrypted in order to make the access control efficient. This section shows the samples of encryption, in which the name space and the contents of data are omitted. NOTE: Apache XML security was used in the prototype as a middleware for encryption. We encrypted in the prototype by the form that didn't omit “xenc”, because it was necessary for the name space of the encryption tag in apache XML security. The version of Apache XML security which were used in JAXA/TACC and NASA/JPL was

2008 Spring CCSDS meeting ( Washington, USA ) SMWG UMR-1 SA1 : 1) For Invocation, Acknowledgement, Successful return and Failed return UMR-1 SA1 :

2008 Spring CCSDS meeting ( Washington, USA ) SMWG : 2) For sleSmExceptionResponse : NOTE: The sleSmExceptionResponse.unrecoginzedMessageSetResponse was not encrypted, considering the case that the receiver did not recognize the sender or the service agreement was not recognized. The sleSmExceptionResponse.invalidMessageResponse was encrypted.

2008 Spring CCSDS meeting ( Washington, USA ) SMWG Data Compression ATP operation went out of control by limiting data communication at JAXA since volume of the OEM, which was exchanged at ATP operation, was a large amount of data (this time it was greater than 5 Mbytes). Therefore, we conducted data compression of the OEM to reduce the data volume. This section shows the method of data compression which was used for transmission of the much volume data between JAXA/Tsukuba and JPL. a. DATA TYPE The following data was always compressed between JAXA/Tsukuba and JPL. Data Type:Trajectory Prediction Message Type:Orbit Data Message ODM Type: Orbit Ephemeris Message (OEM) File Type:Text SM operation:Add Trajectory Prediction (ATP) b. IMPLEMENTATION FOR DATA COMPRESSION JAXA/UMR-1(UM) stored the OEM text into bilateralTrajectoryData of ATP invocation. bilateralTrajectoryFormatId: ZipOEMTxt Compress: Zip Encodeing : Base64

2008 Spring CCSDS meeting ( Washington, USA ) SMWG Test Result 4-2. Test Tracking Test Tracking was scheduled from End of February in This testing was performed with DSN network and Test facilities. The desired time for testing is shown in the table 4-4. Test CaseOperationsTimeDateResult Test Case 1Service Management Feb 28, 2008 (DOY059) succeeded Transfer Service *1Mar 1, 2008 (DOY061) succeeded Test Case 2Service Management Feb 28, 2008 (DOY059) Succeeded Transfer Service *1Mar 3, 2008 (DOY063) Succeeded Test Case 3Service Management Mar 3, 2008 (DOY063) Succeeded Transfer Service *1Mar 6, 2008 (DOY066) succeeded Table 4-4 Test Tracking Result NOTE: *1) The start/end time were the duration from BOA(=BOT-45min.) to EOA(=EOT+15min).

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 19 Date Resource Feb 28Feb 29Mar 1Mar 2Mar 3Mar 4Mar 5Mar 6 DOY 059DOY 060DOY 061DOY 062DOY 063DOY 064DOY 065DOY 066 SLE-SM DSN Pass SLE Transfer (Only RAF) Test Case 1 Test Case 2 Test Case 3 Pass#1 Trk#1Trk#2 Acq#1 Acq#2 Pass#2 Trk#3 Acq#3 Pass#3 Trk#4 Acq#4 6 Oprs 2 Oprs Figure 4-3Test Tracking TIMELINE

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 20 ACP Test Case Resource SLE-SM CSSXP(JPL) DSN Pass Test Case 1 QSAATP UMR-1(JAXA) CSP SLE Transfer (Only RAF) Feb 28(DOY 059) Pass-1 TDS(JPL) JAXA/Sagamihara March 1(DOY 061) ACP TransferService ServiceUse BOABOT 13:00 EOT 15:00 EOA SpaceLink Acquisition #1 Pass#1 Figure 4-4Test case 1 TIMELINE

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 21 Test Case Resource SLE-SM CSSXP(JPL) DSN Pass Test Case 2 SpaceLink TransferService UMR-1(JAXA) CSP SLE Transfer (Only RAF) Pass-23 TDS(JPL) JAXA/Sagamihara TransferService ServiceUse Feb 28(DOY 059)March 3(DOY 063) Acquisition #23 BOABOT 13:00 EOT 14:35 EOA Pass#2 Figure 4-5Test case 2 TIMELINE

2008 Spring CCSDS meeting ( Washington, USA ) SMWG 22 Test Case Resource SLE-SM CSSXP(JPL) DSN Pass Test Case 3 ATP UMR-1(JAXA) CSP SLE Transfer (Only RAF) Pass-3 TDS(JPL) JAXA/Sagamihara Mar 4 (DOY 064)March 6(DOY 066) TransferService ServiceUse TransferService ServiceUse BOABOT 20:50 EOT 21:04 BOT 21:47 EOT 22:15 EOA SpaceLink Acquisition #31 Acquisition #42 Pass#3 The occultation UMR-1 generated two acquisition requests in one service package for SELENE operation. Figure 4-6Test case 3 TIMELINE