Secure Communications in Civil Aviation Paul Wells A presentation to ATN 2002 25 September 2002.

Slides:



Advertisements
Similar presentations
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Advertisements

ATN ‘99, London, 23 September 1999 David Russell ATS Market Manager, SITA AIRCOM SITA AIRCOM Data Link Service.
Inmarsat Aeronautical Communications
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Integrated information and telecommunications solutions AIRCOM Implementation VHF Digital Link Presented by Philip Clinch to ATN 2001 Conference 19 September.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Wired Equivalent Privacy (WEP)
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Applied Cryptography for Network Security
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
ELECTRONIC COMMUNICATIONS A SYSTEMS APPROACH CHAPTER Copyright © 2014 by Pearson Education, Inc. All Rights Reserved Electronic Communications: A Systems.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
IPv6 integration with the ATN Tony Whyman Helios Information Services Ltd.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Presented by Philip Clinch on 27 September 2000 at ATN 2000 Aeronautical Telecommunications Services.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Page 1 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
1 A VPN based approach to secure WLAN access John Floroiu
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Ch 13 Trustworthiness Myungchul Kim
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Network Security Introduction
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Introduction to Exterity
Network Security and Cryptography
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
ACARS Media Management Prepared for DCIT #23 Systems Integration Working Group.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
4G WIRELESS SYSTEM Presented By S. RAVINDER 06U61A0435.
Chapter 1: Explore the Network
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Introduction to Cryptography
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Secure Communications in Civil Aviation Paul Wells A presentation to ATN September 2002

© Copyright QinetiQ Ltd Contents 1Introduction 2Communications security overview 3Secure communications applications 4Conclusions

Introduction Section 1

© Copyright QinetiQ Ltd Introduction Comms security is not just about protection of the data but is protection of the whole end to end system You are as vulnerable as your weakest link Security in aviation applies to: –voice and data links (air/ground) –command & control –passenger communications –airport communications

Communications security overview Section 2

© Copyright QinetiQ Ltd Communications security overview Confidentiality –threat: eavesdropping Integrity –threat: alteration of data Authentication –threat: impersonation of originator, receiver Non-repudiation –threat: source subsequently denies originating information Denial Wireless bearers are notoriously flakey

© Copyright QinetiQ Ltd Secure wireless - link issues

© Copyright QinetiQ Ltd Public KEY Cryptography (PKC) Asymmetric Cryptography No shared secret Invented by Whitfield Diffie and Martin Hellman (1976) Invented by Ellis, Cox & Williamson (around 1970, see

© Copyright QinetiQ Ltd Security between networks GPRSL2PPP IP UDP IP UDP PPP IP Crypto SGSNGGSN DHCP Internet MSTEISPTE PPP Serial PPP Dial up V. Series BTS

Secure comms applications Section 3

© Copyright QinetiQ Ltd Secure communications applications VIP, business and airline operations Airline operations Remote video from airframe Secure voice from helicopters QinetiQ Intruder Protection Systems (QIPS) Wireless access for passengers (ground & air) ATN applications

© Copyright QinetiQ Ltd Airborne secure comms

© Copyright QinetiQ Ltd VIP, business and airline operations Communications via Inmarsat Aero Global connectivity Voice, data & video Protocol enhancement for maximum data throughput Scalable architecture

© Copyright QinetiQ Ltd Airline operations Use of Iridium for low-rate voice or secure data Demonstrated airborne polar to land mobile direct links Secure messaging via Iridium paging

© Copyright QinetiQ Ltd Remote video from airframe

© Copyright QinetiQ Ltd Streamed IP video from airframe on demand Also can stream TV to the airframe - suitable for live news update

© Copyright QinetiQ Ltd Crypto Example of secure voice from helicopters

© Copyright QinetiQ Ltd QinetiQ Intruder Protection Systems (QIPS) Based upon intelligent control of UAV’s QIPS is remote control of airframes via highly secure comms links and EFIS Dual secure encrypted bearers provide redundancy for fail safe system control Allows remote switching of airframe into emergency flight mode to reach auto land phase Authentication and integrity of encrypted link enables this

© Copyright QinetiQ Ltd

© Copyright QinetiQ Ltd Wireless access for passengers Wireless LAN access at Airports Desire for Wireless LAN onboard! Wireless LAN security is weak –Recent press activity showing ease of access to corporate information via low cost WLAN intercept –Authentication of users to bill for service is required Must use widely available WLAN implementations Solution is a security overlay for privacy and billing

© Copyright QinetiQ Ltd Wireless access for passengers

© Copyright QinetiQ Ltd ATN applications Air to ground security study for Eurocontrol –Analogue VHF DSB - AM voice –VDL mode 2 supporting ATN –ACARS Key management is an issue Broadcast needs to be supported

Conclusions Section 4

© Copyright QinetiQ Ltd Conclusions Wireless security is now emerging for other aviation applications as well as for ATN A wireless security overlay can provide privacy of data, authentication of users and prevent alteration of data Wireless security has to be implemented carefully to enable fully secured solutions - it must also be reasonably transparent to the user Any solution must taken into account errored bearers The technology is available today - implementation is the ‘secret sauce’

© Copyright QinetiQ Ltd Inmarsat Aero coverage