29th Digital Avionics Systems Conference 2010
DOI: 10.1109/dasc.2010.5655363
|View full text |Cite
|
Sign up to set email alerts
|

An adaptive security architecture for future aircraft communications

Abstract: This paper presents an original and adaptive security architecture for the future connected aircrafts. A secure system topology for the embedded network is proposed with regards to network and system constraints, service priorities and regulatory recommendations. The design of a new component called Security Manager (SecMan) is explained in details and all its processes are formalized for a better understanding of the proposal made in this paper. A performance study is done in order to assess the advantages of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Software reengineering, Web services and ubiquitous computing each have brought their own needs, leading to various solutions. This even includes network security, where adaptive architectures have been proposed to manage the variations in the security level of physical networks [5]. Solutions such as aspect-oriented programming [24] or component-based architectures (Enterprise Java Beans, Corba Component Model) are related to this issue of supporting programmers who manage the adaptation of software components [26].…”
Section: Adaptation In Software Architecturementioning
confidence: 99%
“…Software reengineering, Web services and ubiquitous computing each have brought their own needs, leading to various solutions. This even includes network security, where adaptive architectures have been proposed to manage the variations in the security level of physical networks [5]. Solutions such as aspect-oriented programming [24] or component-based architectures (Enterprise Java Beans, Corba Component Model) are related to this issue of supporting programmers who manage the adaptation of software components [26].…”
Section: Adaptation In Software Architecturementioning
confidence: 99%
“…In a previous work, we introduced a negotiation protocol as a component of a whole security framework for aeronautical data link communications [19]. The aim of the proposal is to provide an adaptive security policy for APC, AOC, and ATS communications.…”
Section: Securing a Negotiation Protocol Of Supported Security Mechanmentioning
confidence: 99%
“…In this paper, we do not need to explain all the steps of the negotiation phase; the protocol is detailed in [19]. Instead, we focus only on the air-ground messages exchanged between the onboard security proxies (called SMP -Security Manager Proxy) and the ground server: if a passenger requests for a secure connection with a groundlocated server, the SMP takes the lead and makes the negotiation with the server.…”
Section: Securing a Negotiation Protocol Of Supported Security Mechanmentioning
confidence: 99%
“…In fact a cryptographic operation could be computationally pretty intensive. The computational cost of a cryptographic algorithm (encryption and decryption) depends on a number of properties such as the size of the cryptographic key, internal state, block size and number of rounds [4] [87] [17] [139]. A cryp tographic algorithm could be strong in terms of security but costly in terms of computational cost.…”
Section: Motivationmentioning
confidence: 99%
“…Our investigation shows that this is a relatively less explored problem. [87], [17] [62] and [148] address the issue of impact on streaming performance due to inclusion of cryptography. Based on the discussion of the addressed issue, our motivation is drawn and research goal is identified.…”
Section: Motivationmentioning
confidence: 99%