Journal article 440 views 60 downloads
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications
International Journal of Critical Infrastructure Protection, Volume: 42, Start page: 100619
Swansea University Author: Pardeep Kumar
-
PDF | Version of Record
/© 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)
Download (1.48MB)
DOI (Published version): 10.1016/j.ijcip.2023.100619
Abstract
Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly resilient and bandwidthefficient, which makes it the best choice for traffic-congested airports. Although CPDLC initially seems to be...
Published in: | International Journal of Critical Infrastructure Protection |
---|---|
ISSN: | 1874-5482 |
Published: |
Elsevier BV
2023
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa63735 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract: |
Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly resilient and bandwidthefficient, which makes it the best choice for traffic-congested airports. Although CPDLC initially seems to be a perfect solution for modern-day ATC operations, it suffers from serious security issues. For instance, eavesdropping, spoofing, man-in-the-middle, message replay, impersonation attacks, etc. Cyber attacks on the aviation communication network could be hazardous, leading to fatal aircraft incidents and causing damage to individuals, service providers, and the aviation industry. Therefore, we propose a new security model called AKAASH, enabling several paramount security services, such as efficient and robust mutual authentication, key establishment, and a secure handover approach for the CPDLC-enabled aviation communication network. We implement the approach on hardware to examine the practicality of the proposed approach and verify its computational and communication efficiency and efficacy. We investigate the robustness of AKAASH through formal (proverif) and informal security analysis. The analysis reveals that the AKAASH adheres to the CPDLC standards and can easily integrate into the CPDLC framework. |
---|---|
Keywords: |
Authentication, CPDLC, Critical infrastructure Safety and Security |
College: |
Faculty of Science and Engineering |
Funders: |
This work was supported by Trafikverket and Luftfartsverket under Automation Program II. This work was also partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) . |
Start Page: |
100619 |