DOI QR코드

DOI QR Code

Security Architecture for T4 Class Common Data Link

  • Received : 2017.08.09
  • Accepted : 2017.08.22
  • Published : 2017.08.31

Abstract

In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.

Keywords

Acknowledgement

Supported by : ADD

References

  1. W.-P. Kang, J.-Y. Song, K.-H. Lee, D,-H. Lee, S.-J. Jung, H.-J. Choi. "Analysis of Common Data Link Technology Trends for the Next Generation Korean Common Data Link Development", The J. of Korea Inform. and Commun. Society, vol.39C no.3, pp.209-222, March, 2014.
  2. E. S. Lim, "Concept of tactical data link employment and next C4ISR system," Quart, J. Defence Policy Stud., vol. 74, pp. 49-83, 2007.
  3. J. S. Kim, S. J. Kim, and M. Y Lim, "Overview of tactical data link technology," J. KISSE, vol. 74, no, 9, pp. 18-28, Sept. 2007.
  4. J. S. Eum and B. O. Ahn, "Development trends and preview point of MPI-CDL in Israel," KIDA Defense Weekly, no. 1404, Apr. 2012.
  5. J. M. Chung, K. C. Park, T. Y. Won, U. H.Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H.Kim, and U. Y. Pak, "Standardization strategy for the image and intelligence common data link," The J. Korean Inform. Commun. Mag., vol. 28, no. 4, pp. 41-50, Apr. 2011.
  6. Sheila Frankel, Bernard Eydt, Les Owens, Karen Scarfone, NIST Special Publication 800-97 - Establishing Wireless Robust Security Networks: Guide to IEEE 802.11i. Feb. 2007, NIST. URL- http://nvlpubs.nist.gov/nistpubs /Legacy/SP/nistspecial-publication800-97.pdf
  7. https://en.wikipedia.org/wiki/Extensible_Authenticatio n_Protocol
  8. https://en.wikipedia.org/wiki/IEEE_802.1X
  9. IEEE, 802.1x-2010, http://standards.ieee.org/getie ee802/download/802.1X-2010.pdf
  10. Jeremy Horwitz, "A Survey of Broadcast Encryption," Jan. 2003 URL- http://xenon.stanford.edu/-horwitz/pubs/broadcast.pdf
  11. Du, Xinjun, et al. "An ID-based broadcast encrypti on scheme for key distribution." IEEE Transactions on broadcasting, vol 51, no.2 pp.264-266, June 2005. https://doi.org/10.1109/TBC.2005.847600
  12. https://libraries.docs.miracl.com/
  13. https://en.wikipedia.org/wiki/High-Level_Data_Link_ Control