On the Security of MIL-STD-1553 Communication Bus

MIL-STD-1553 is a military standard that defines the physical and logical layers, and a command/response time division multiplexing of a communication bus used in military and aerospace avionic platforms for more than 40 years. As a legacy platform, MIL-STD-1553 was designed for high level of fault tolerance while less attention was taken with regard to security. Recent studies already addressed the impact of successful cyber-attacks on aerospace vehicles that are implementing MIL-STD-1553. In this work we present a security analysis of MIL-STD-1553, which enumerates the assets and threats to the communication bus, as well as defines the attacker’s profile.

[1]  Markus G. Kuhn,et al.  Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.

[2]  J. K. Murdock,et al.  Open systems avionics network to replace MIL-STD-1553 , 2000, 19th DASC. 19th Digital Avionics Systems Conference. Proceedings (Cat. No.00CH37126).

[3]  Dale C. Rowe,et al.  A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.

[4]  J.-J. Mayoux The data bus of the next generation European fighters , 1993, Proceedings of the IEEE 1993 National Aerospace and Electronics Conference-NAECON 1993.

[5]  Michael Atighetchi,et al.  Survivability architecture of a mission critical system: the DPASA example , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[6]  Kyung Joon Kwak,et al.  Systems design of cybersecurity in embedded systems , 2016, 2016 IEEE High Performance Extreme Computing Conference (HPEC).

[7]  Thuy D. Nguyen Towards MIL-STD-1553B covert channel analysis , 2015 .

[8]  David Umphress,et al.  Cyber threat impact assessment and analysis for space vehicle architectures , 2014, Defense + Security Symposium.

[9]  A. Gillen,et al.  Introduction of 3910 high speed data bus , 1992, MILCOM 92 Conference Record.

[10]  Jon R. Lindsay,et al.  Stuxnet and the Limits of Cyber Warfare , 2013 .

[11]  Virgil D. Gligor,et al.  A Note on the Denial-of-Service Problem , 1983, 1983 IEEE Symposium on Security and Privacy.

[12]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[13]  Emanuele Garone,et al.  False Data Injection Attacks for State Estimation in Cyber-Physical Systems , 2010, CDC 2010.

[14]  Nan Sang,et al.  Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks , 2010, 2010 Fifth International Conference on Frontier of Computer Science and Technology.