Browse > Article
http://dx.doi.org/10.6109/jkiice.2018.22.1.202

A Proposal on Cryptographic Synchronization for T4 Link Encryption  

Lee, HoonJae (Department of Information and Communication Engineering, Dongseo University)
Kim, KiHwan (Department of Ubiquertous IT, Dongseo University)
Kang, YongJin (Department of Ubiquertous IT, Dongseo University)
Lee, Sang-Gon (Department of Information and Communication Engineering, Dongseo University)
Ryu, Young-Jae (ADD)
Abstract
The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.
Keywords
link encryption; NCW; Encryption system; Cryptographic synchronization;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 P. T. Mitchell, Network Centric Warfare: Coalition operations in the age of US military primacy, 1th ed. New York, NY: Routledge, 2013.
2 D. S. Alberts and R.E. Hayes, Power to the Edge: Command and Control in the Information Age, 1th ed. Washington DC, WA: CCRP Publication Series, 2003.
3 G. C. Wang, B. S. Lee, K. J. Lim and J. Y. Ahn, "Technical Trends on Security of Control and Non-payload Communications Network for Unmanned Aircraft Systems," International Journal of Electronics and Telecommunications Research Institute, vol. 32, no. 1, pp. 82-92, Feb. 2017.
4 Weatherington, Dyke, and U. Deputy, "Unmanned aircraft systems roadmap, 2005-2030." United States, Office of the Secretary of Defense, Technical Report, 2005.
5 J. M. Chung, K. C. Park, T. Y. Won, U. H. Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H. Kim and U. Y. Pak, "Standardization Strategy for the Image and Intelligence Common Datalink," International Journal of the Korean Information and Communication Magazine, vol. 28, no. 4, pp.41-50, Apr. 2011.
6 E. Burak, E. C. A. Nail, T. Craig and M. Ken, "A 275 Gbps AES encryption accelerator using ROM-based S-boxes in 65nm," in Proceeding of the Custom Integrated Circuits Conference, California: CA, pp. 1-4, 2015.
7 Y. J. Ryu and J. M. Ahn, "Research on Performance Analysis for the Long Distance Air-Ground Wideband Common Data Link," International Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 04, pp. 703-715, Apr. 2017.   DOI
8 F. H. Myers, "A Data Link Encryption System," in Proceeding of National Telecommunications Conference, Washington: WA, pp. 27-29, 1979.
9 D. H. Lim, S. J. Lee, "Public Key Authentication using Secret Sharing and ECC for Tactical Communication Networks," Journal of Security Engineering, vol. 13, no. 6 pp. 421-438, Dec. 2016.   DOI
10 D. J. C. MacKay, Information theory, Inference and Learning Algorithms, 1th ed. Cambridge, CBG: Cambridge University Press, 2003.
11 T. K. Moon, Error Correction Coding: Mathematical Methods and Algorithms, 1th ed. New Jersey, NY : John Wiley & Sons, 2005.
12 N. Bruce, Y. S. Lee, W. T. Jang and H. J. Lee, "Next Generation Encryption of Enhanced Light-weight Stream Cipher for Communication Systems," International Journal of Wireless Devices and Engineering, vol. 1, no. 1, pp. 27-32, 2017.
13 A. Kahate, Cryptography and network security, 3th ed, New Delhi, IN: Tata McGraw-Hill Education, 2013.
14 H. J. Lee, I. S. Ko (Franz Ko), "An Intelligent Security Agent for Reliable Cipher System using PingPong," Cybernetics and Systems, vol. 39, no. 7, pp.705-718, Oct. 2008.   DOI
15 H. R. Kim, H. J. Lee, D. H. Kwon, U. Y. Pak, "A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 12, pp.2891-2898, Dec. 2013.   DOI