Efficient Control-Channel Security for the Aeronautical Communications System LDACS

Since Air Traffic Management (ATM) is still conducted largely via analogue voice communications, the digitization of data transmission is crucial to automate and secure ATM in civil aviation. For that purpose, several new digital data links are developed. The continental, terrestrial long-range candidate is the L-band Digital Aeronautical Communications System (LDACS), which is a cellular, ground-based digital communications system for flight guidance and communications related to the safety and regularity of flight. The security of LDACS has been the focus of recent works, however, the problem to secure data on its small control-channels remains unsolved. The objective of this work is to propose slim and efficient security measures to protect data on the LDACS control-channels and evaluate their security and performance impact. First, via a 3-pass instancing of the ISO/IEC11770-3:2021 “Key agreement mechanism 7” protocol, keys to secure LDACS control-channels are established between air and ground radios. Second, via these point-to-point keys and point-to-multipoint group keys, the control-channels are secured. Thereby the limitations set by the limited bandwidth are respected and cryptographic overhead optimized. Finally, the security of our proposal is validated using a symbolic model with the Tamarin proof system. Also, via computer simulations, the LDACS performance impact of the control-channel security solutions is evaluated.

[1]  Miguel A. Bellido-Manganell,et al.  LDACS Flight Trials: Demonstration of ATS-B2, IPS, and Seamless Mobility , 2023, 2023 Integrated Communication, Navigation and Surveillance Conference (ICNS).

[2]  L-Band Digital Aeronautical Communications System (LDACS) , 2023 .

[3]  Gabi Dreo Rodosek,et al.  Advancing the Security of LDACS , 2022, IEEE Transactions on Network and Service Management.

[4]  Michael Schnell,et al.  LDACS Flight Trials: Demonstration and Performance Analysis of the Future Aeronautical Communications System , 2022, IEEE Transactions on Aerospace and Electronic Systems.

[5]  Nelson P. Lewis Restrictions , 2021, Planning the Modern City.

[6]  Michael Felux,et al.  Flight Trial Demonstration of Secure GBAS via the L-band Digital Aeronautical Communications System (LDACS) , 2021, IEEE Aerospace and Electronic Systems Magazine.

[7]  Corinna Schmitt,et al.  L-Band Digital Aeronautical Communications System (LDACS) , 2020, RFC.

[8]  Corinna Schmitt,et al.  FACTS2: Framework for Aeronautical Communications and Traffic Simulations 2 , 2019, PE-WASUN '19.

[9]  Omar García Crespillo,et al.  Feasibility Demonstration of Terrestrial RNP with LDACS , 2019, Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019).

[10]  Nils Mäurer,et al.  An Air Traffic Management Data Traffic Pattern for Aeronautical Communication System Evaluations , 2019, 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC).

[11]  Arne Bilzhause,et al.  A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS) , 2018, 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC).

[12]  Mohamed Slim Ben Mahmoud,et al.  Aeronautical communication transition from analog to digital data: A network security survey , 2014, Comput. Sci. Rev..

[13]  David A. Basin,et al.  The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.

[14]  C. Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[15]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[16]  C. Schmitt,et al.  Security in Digital Aeronautical Communications A Comprehensive Gap Analysis , 2022, Int. J. Crit. Infrastructure Prot..

[17]  Thomas Ewert,et al.  Concept of Group Key Distribution Procedures for the L-Band Digital Aeronautical Communications System (LDACS) , 2021 .

[18]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2020, Information Security and Cryptography.

[19]  K. Murphy,et al.  Technology Administration , 2005 .