Abstract

Information security is critical in Air Traffic Management systems. Those systems use, among other sources, information received from the Radar Heads Processors. This information is used in the processed form of ASTERIX System Tracks. The accuracy and protection of this data is essential for the Air Traffic Management process. System Track tracks radar data securing by adding a digital signature to each system track. A record requires high processing resources, especially for 2048 bits RSA keys. This approach does not modify the ASTERIX code structure thus keeping the compatibility with other communication partners. However, the use of this method in a sensitive environment like Air Traffic Management may obstruct real time radar data processing. The aim of this paper is to indicate new securing methods that will overcome this problem. Two alternatives are proposed and analyzed that can be combined in order to secure the data in real time. One alternative is using more powerful processing units and the other is applying an optimized method for adding a digital signature to system track data. Unlike the initial approach, where every System Track Record is added a digital signature, the new method relies on adding a digital signature to an entire block of records. The initial method and the optimized method were tested using several processing units. The results showed that the new method adds an insignificant overhead to the existing processing resources allowing the planning for real time system track data securing.


Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.2495/safe130431
https://trid.trb.org/view/1263963,
https://www.witpress.com/elibrary/wit-transactions-on-the-built-environment/134/25140,
https://academic.microsoft.com/#/detail/2015093955
Back to Top

Document information

Published on 01/01/2013

Volume 2013, 2013
DOI: 10.2495/safe130431
Licence: CC BY-NC-SA license

Document Score

0

Views 0
Recommendations 0

Share this document

Keywords

claim authorship

Are you one of the authors of this document?