Security and Privacy
of Air Traffic Communication
Tatiana Polishchuk, KTS, LiU
AEAR group
Wireless Communication Technologies in ATC
* A figure by M. Strohmeier in Security in Next Generation Air Traffic Communication Networks - STATE OF THE ART paper
Wireless Communication Technologies in ATC
* A figure by M. Strohmeier in Security in Next Generation Air Traffic Communication Networks - STATE OF THE ART paper
Commercial Data Link Vulnerabilities
Community of Hobbyists: available equipment
What we can do
CYBSEC Pre-studies on CPDLC and TCAS
Air to air (TCAS)
Threat model (IMPORTANT!)
Current research (CYBSEC)
- CPDLC, VHF, TCAS, ACARS
Goals
Controller Pilot Data Communication (CPDLC)
REF: A. Gurtov, T. Polishchuk, M. Wernberg. Controller–Pilot Data Link Communication Security. Sensors 2018, 18 (5), 1636; https://doi.org/10.3390/s18051636
Controller Pilot Data Communication (CPDLC)
CPDLC logon process
CPDLC logon request message
CPDLC logon request message
Requirements for a secure communication system
Possible attacks against CPDLC technology
Threat Model for CPDLC
Threat modeling - is a process by which potential threats, such as structural vulnerabilities can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of view. (from Wikipedia)
Threat model - exhaustive list of all possible types of attacks against a communication channel and/or its secure communication attributes
Threat Actors
PASSIVE ATTACKERS | ACTIVE ATTACKERS |
|
|
Another example of a threat model:
Possible attacks against TCAS technology
Counter measures
3 types of solutions = 3 ways to go
ECC (Elliptic-Curve Cryptography) encryption (standard for military)
PACARS (commercial software for ACARS protection, ECC based)
LHIP (Host Identity Protocol for Lightweight networks)
Elliptic-Curve Cryptography encryption
Protected ACARS
(lacks open access version)
Requirements for a secure communication system
Flight Management System
Host Identity Protocol for Lightweight networks (LHIP)
Host Identity Protocol for Lightweight networks (LHIP)
2. Genuine Solutions
1. Preserve Legacy Investments. Integrates with the existing devices and infrastructure.
2. Enable instant provisioning. Increases network transparency and manageability.
3. Segmenting Networks. Smaller, more manageable networks are more robust and secure.
4. Increased Operational Integrity and Availability. Visibility into network traffic enables diagnostics, debugging, and performance optimization.
5. Secure Remote Access. Highly constrained remote access that is simple to grant and revoke.
Example: Tempered Networks (IDN) (approved by Boeing)
network
HIPswitch
HIPswitch
HIP client
3. Procedural solutions
Outside of the box
Counter measures
3 types of solutions = 3 ways to go
1. Local technological fixes (a lot of proposals within the community)
2. Genuine solutions (General for all communication technologies)
3. Procedural (redundancy, backup procedures, PERSONNEL AWARENESS TRAININGS)
Q: Which way do we choose now?
Future work
Apply mathematical analysis to feasibility evaluation in one of the scenarios
(air-to-ground, air-to-air, ground-to-ground, other?)
Proceed with empirical evaluation and testing of the most promising approaches for selected technologies (security LAB in IDA)?
THANK YOU!
Questions/ Comments?