Browse > Article
http://dx.doi.org/10.9708/jksci.2017.22.08.063

Security Architecture for T4 Class Common Data Link  

Lee, Sang-Gon (Div. of Computer Engineering, Dongseo University)
Lee, Hoon-Jae (Div. of Computer Engineering, Dongseo University)
Kim, Hyeong-Rag (Dept. of IT& Electronics, Pohang University)
Ryu, Young-Jae (ADD)
Abstract
In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.
Keywords
RSN; EAP; 802.1x; 802.11i; HDLC; CDL; ID-based cryptography; Broadcast encryption;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 https://en.wikipedia.org/wiki/IEEE_802.1X
2 IEEE, 802.1x-2010, http://standards.ieee.org/getie ee802/download/802.1X-2010.pdf
3 Jeremy Horwitz, "A Survey of Broadcast Encryption," Jan. 2003 URL- http://xenon.stanford.edu/-horwitz/pubs/broadcast.pdf
4 Du, Xinjun, et al. "An ID-based broadcast encrypti on scheme for key distribution." IEEE Transactions on broadcasting, vol 51, no.2 pp.264-266, June 2005.   DOI
5 https://libraries.docs.miracl.com/
6 https://en.wikipedia.org/wiki/High-Level_Data_Link_ Control
7 W.-P. Kang, J.-Y. Song, K.-H. Lee, D,-H. Lee, S.-J. Jung, H.-J. Choi. "Analysis of Common Data Link Technology Trends for the Next Generation Korean Common Data Link Development", The J. of Korea Inform. and Commun. Society, vol.39C no.3, pp.209-222, March, 2014.
8 E. S. Lim, "Concept of tactical data link employment and next C4ISR system," Quart, J. Defence Policy Stud., vol. 74, pp. 49-83, 2007.
9 J. S. Kim, S. J. Kim, and M. Y Lim, "Overview of tactical data link technology," J. KISSE, vol. 74, no, 9, pp. 18-28, Sept. 2007.
10 J. S. Eum and B. O. Ahn, "Development trends and preview point of MPI-CDL in Israel," KIDA Defense Weekly, no. 1404, Apr. 2012.
11 https://en.wikipedia.org/wiki/Extensible_Authenticatio n_Protocol
12 J. M. Chung, K. C. Park, T. Y. Won, U. H.Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H.Kim, and U. Y. Pak, "Standardization strategy for the image and intelligence common data link," The J. Korean Inform. Commun. Mag., vol. 28, no. 4, pp. 41-50, Apr. 2011.
13 Sheila Frankel, Bernard Eydt, Les Owens, Karen Scarfone, NIST Special Publication 800-97 - Establishing Wireless Robust Security Networks: Guide to IEEE 802.11i. Feb. 2007, NIST. URL- http://nvlpubs.nist.gov/nistpubs /Legacy/SP/nistspecial-publication800-97.pdf