Securing the global airspace system via identity-based security

Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific QoS requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are LTE and WiMAX This paper provides a system-level view of network-centric operations for the GAS and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

[1]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP) , 2005, RFC.

[2]  H. Ekstrom QoS control in the 3GPP evolved packet system , 2009, IEEE Communications Magazine.

[3]  Fred Baker,et al.  A Differentiated Services Code Point (DSCP) for Capacity-Admitted Traffic , 2010, RFC.

[4]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[5]  Dan Forsberg Secure Distributed AAA with Domain and User Reputation , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[6]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[7]  Jie Hui,et al.  Quality of service in WiMAX and LTE networks [Topics in Wireless Communications] , 2010, IEEE Communications Magazine.

[8]  AlastiMehdi,et al.  Quality of service in WiMAX and LTE networks , 2010 .

[9]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[10]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[11]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[12]  X Itu,et al.  Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .

[13]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.