2,513 research outputs found

    Wireless and Sensor Networks Security (WSNS): A Retrospection

    Get PDF

    Modular, Cost-Effective, Extensible Avionics Architecture for Secure, Mobile Communications

    Get PDF
    Current onboard communication architectures are based upon an all-in-one communications management unit. This unit and associated radio systems has regularly been designed as a one-off, proprietary system. As such, it lacks flexibility and cannot adapt easily to new technology, new communication protocols, and new communication links. This paper describes the current avionics communication architecture and provides a historical perspective of the evolution of this system. A new onboard architecture is proposed that allows full use of commercial-off-the-shelf technologies to be integrated in a modular approach thereby enabling a flexible, cost-effective and fully deployable design that can take advantage of ongoing advances in the computer, cryptography, and telecommunications industries

    Advancing the Standards for Unmanned Air System Communications, Navigation and Surveillance

    Get PDF
    Under NASA program NNA16BD84C, new architectures were identified and developed for supporting reliable and secure Communications, Navigation and Surveillance (CNS) needs for Unmanned Air Systems (UAS) operating in both controlled and uncontrolled airspace. An analysis of architectures for the two categories of airspace and an implementation technology readiness analysis were performed. These studies produced NASA reports that have been made available in the public domain and have been briefed in previous conferences. We now consider how the products of the study are influencing emerging directions in the aviation standards communities. The International Civil Aviation Organization (ICAO) Communications Panel (CP), Working Group I (WG-I) is currently developing a communications network architecture known as the Aeronautical Telecommunications Network with Internet Protocol Services (ATN/IPS). The target use case for this service is secure and reliable Air Traffic Management (ATM) for manned aircraft operating in controlled airspace. However, the work is more and more also considering the emerging class of airspace users known as Remotely Piloted Aircraft Systems (RPAS), which refers to certain UAS classes. In addition, two Special Committees (SCs) in the Radio Technical Commission for Aeronautics (RTCA) are developing Minimum Aviation System Performance Standards (MASPS) and Minimum Operational Performance Standards (MOPS) for UAS. RTCA SC-223 is investigating an Internet Protocol Suite (IPS) and AeroMACS aviation data link for interoperable (INTEROP) UAS communications. Meanwhile, RTCA SC-228 is working to develop Detect And Avoid (DAA) equipment and a Command and Control (C2) Data Link MOPS establishing LBand and C-Band solutions. These RTCA Special Committees along with ICAO CP WG/I are therefore overlapping in terms of the Communication, Navigation and Surveillance (CNS) alternatives they are seeking to provide for an integrated manned- and unmanned air traffic management service as well as remote pilot command and control. This paper presents UAS CNS architecture concepts developed under the NASA program that apply to all three of the aforementioned committees. It discusses the similarities and differences in the problem spaces under consideration in each committee, and considers the application of a common set of CNS alternatives that can be widely applied. As the works of these committees progress, it is clear that the overlap will need to be addressed to ensure a consistent and safe framework for worldwide aviation. In this study, we discuss similarities and differences in the various operational models and show how the CNS architectures developed under the NASA program apply

    IP Mobility in Aeronautical Communications

    Get PDF
    International audienceIn the sake of modernization, aviation stakeholders decided that the future aviation network infrastructure, in particular for air-ground communication systems, will move towards IP based networks. It has been referred to in the International Civil Aviation Organization as Aeronautical Telecommunication Network/Internet Protocol Suite. Due to the heterogeneous communication environment , it is necessary to support handover between different access technologies and access networks. In this article, we first define the very specific aeronautical communication environment. Our main contribution is a performance assessment of the most deployed network protocols capable of managing IP mobility within the aeronautical environment. We focus our analysis on the Mobile IPv6 protocol and implementation issues of a representative aeronautical network in Omnet++

    EPSRC IMPACT Exhibition

    Get PDF
    This exhibition was conceived by Dunne (PI) and comprised 16 mixed-media speculative design research projects. It marked the culmination of an EPSRC-funded initiative also partly supported by NESTA. Dunne supervised and then curated the projects by staff, graduates and students of the RCA Design Interactions programme. Each was conducted in collaboration with an external research partner organisation already supported by the EPSRC. The topics covered ranged from renewable energy devices and security technologies to the emerging fields of synthetic biology and quantum computing. Dunne and an advisory panel from EPSRC and NESTA selected themes on the basis of diversity of topic, design opportunities, intellectual and creative challenges, and public relevance. Dunne invited the designers to take a radical, interrogative approach, exploring the social, ethical and political implications of the research. Each designer visited the relevant science lab, consulted with the scientists throughout the project, and participated in a one-day workshop hosted by NESTA between scientists and designers on such forms of collaboration. Designers carried out literature, journal, and project surveys before developing their projects through iterative prototypes. The exhibition, held at the RCA in 2010, was considered by EPSRC to offer a powerful insight into how today’s research might transform our experience of the world. It was reviewed in the Guardian (2010), Wired (2010) and Design Week (2010). Dunne presented ‘IMPACT!’ in conferences including the IDA Congress, ‘Design at the Edges’, Taipei (2011) and at the Wellcome Trust, London (2011). He gave a related lecture to researchers at Microsoft Research Asia, Beijing (2011). Individual exhibits from the project featured in exhibitions: Museum of Modern Art (2011), National Museum of China (2011); Z33 (2010–11); Wellcome Trust (2010–11); Saint-Étienne International Design Biennial (2010); Ars Electronica (2010); The Times Cheltenham Science Festival (2010); and V2_, Institute for the Unstable Media (2010)

    A context‐aware approach to defend against unauthorized reading and relay attacks in RFID systems

    Full text link
    Radio frequency identification (RFID) systems are becoming increasingly ubiquitous in both public and private domains. However, because of the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise because of the tag's promiscuous response to any reader requests. This renders sensitive tag information easily subject to unauthorized reading . Promiscuous tag response also incites different forms of relay attacks whereby a malicious colluding pair, relaying messages between a tag and a reader, can successfully impersonate the tag without actually possessing it. Because of the increasing ubiquity of RFID devices, there is a pressing need for the development of security primitives and protocols to defeat unauthorized reading and relay attacks. However, currently deployed or proposed solutions often fail to satisfy the constraints and requirements of the underlying RFID applications in terms of (one or more of) efficiency, security, and usability. This paper proposes a novel research direction, one that utilizes sensing technologies, to tackle the problems of unauthorized reading and relay attacks with a goal of reconciling the requirements of efficiency, security, and usability. The premise of the proposed work is based on a current technological advancement that enables many RFID tags with low‐cost sensing capabilities. The on‐board tag sensors will be used to acquire useful contextual information about the tag's environment (or its owner, or the tag itself). For defense against unauthorized reading and relay attacks, such context information can be leveraged in two ways. First, contextual information can be used to design context‐aware selective unlocking mechanisms so that tags can selectively respond to reader interrogations and thus minimize the likelihood of unauthorized reading and “ghost‐and‐leech” relay attacks. Second, contextual information can be used as a basis for context‐aware secure transaction verification to defend against special types of relay attacks involving malicious readers. Copyright © 2011 John Wiley & Sons, Ltd. This paper proposes a novel research direction, one that utilizes sensing technologies to tackle the challenging problems of unauthorized reading and relay attacks in radio frequency identification systems. First, contextual information is used to design context‐aware selective unlocking mechanisms, so that tags can selectively respond to reader interrogations and, thus, minimize the likelihood of unauthorized reading and “ghost‐and‐leech” relay attacks. Second, contextual information is used as a basis for context‐aware secure transaction verification to defend against special types of relay attacks involving malicious readers.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/109577/1/sec404.pd
    • 

    corecore