Security Architecture for T4 Class Common Data Link

  • Received : 2017.08.09
  • Accepted : 2017.08.22
  • Published : 2017.08.31


In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.



Supported by : ADD


  1. W.-P. Kang, J.-Y. Song, K.-H. Lee, D,-H. Lee, S.-J. Jung, H.-J. Choi. "Analysis of Common Data Link Technology Trends for the Next Generation Korean Common Data Link Development", The J. of Korea Inform. and Commun. Society, vol.39C no.3, pp.209-222, March, 2014.
  2. E. S. Lim, "Concept of tactical data link employment and next C4ISR system," Quart, J. Defence Policy Stud., vol. 74, pp. 49-83, 2007.
  3. J. S. Kim, S. J. Kim, and M. Y Lim, "Overview of tactical data link technology," J. KISSE, vol. 74, no, 9, pp. 18-28, Sept. 2007.
  4. J. S. Eum and B. O. Ahn, "Development trends and preview point of MPI-CDL in Israel," KIDA Defense Weekly, no. 1404, Apr. 2012.
  5. J. M. Chung, K. C. Park, T. Y. Won, U. H.Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H.Kim, and U. Y. Pak, "Standardization strategy for the image and intelligence common data link," The J. Korean Inform. Commun. Mag., vol. 28, no. 4, pp. 41-50, Apr. 2011.
  6. Sheila Frankel, Bernard Eydt, Les Owens, Karen Scarfone, NIST Special Publication 800-97 - Establishing Wireless Robust Security Networks: Guide to IEEE 802.11i. Feb. 2007, NIST. URL- /Legacy/SP/nistspecial-publication800-97.pdf
  7. n_Protocol
  9. IEEE, 802.1x-2010, ee802/download/802.1X-2010.pdf
  10. Jeremy Horwitz, "A Survey of Broadcast Encryption," Jan. 2003 URL-
  11. Du, Xinjun, et al. "An ID-based broadcast encrypti on scheme for key distribution." IEEE Transactions on broadcasting, vol 51, no.2 pp.264-266, June 2005.
  13. Control