A New Approach towards Secure Iff Technique
نویسنده
چکیده
Ident~fication between Friend and Foe (IFF) is a technique for recognizing a plaform, be it ship, aircraft or helicopter. It is widely used in both civil and milita~ worlds. In the case of the former, aircraft coming in to land at airports are recognised; while various units / platjorms are accessed for multiple applications in the case of the latter. The new technique being proposed here is based on the concept of public-key cryptography: security rests in exploiting the dlfjcul~ offinding discrete logarithms over an elliptic curve (EC), where the elliptic curve itself is defined over a binary j%zite jield. The proposed scheme has signljlcant merits of using insecure channels, compact implementation and speed suitable for real-time applications without prejudice to confidentiality and integrity. A “challenge response” type of protocol, typical of IFF, is being adhered to. INTRODUCTION IFF is installed in every aircraft and ship, be it civil or military, for the purpose of electronic identification based on the “challenge-response” protocol. Pre-set codes within various modes are agreed upon and promulgated amongst “friendly” units. If the incoming unit responds correctly to these codes, it is regarded as friendly. If, however, the response is contrary, the unit is deemed to carry “hostile” intent and so invites the follow up action. The system typically works with Radar, so directional response is accorded. Looking in the military domain, it’s utility is not only in war-time but equally so during peace. Identification is vital for authentication of the incoming unit to inhibit any illegitimate access to the information link, maintained between various participating units, analogous to Wide Area Network (WAN) connected through radio link employing Direct Sequence Spread Spectrum (DSSS) technique, with Time Division Multiple Access (TDMA) allowing individual units to transmit over the link. Illegitimate access to the link can result in loss of valuable information. Any ship or aircraft appearing on a platforms’ (ship, aircraft or air defence centre) sensors need to be identified immediately to ascertain its intentions. If deemed friendly by IFF, the incoming unit is accorded access to the defence umbrella around the platform and thus, to the information as well, although further database access control scheme may also be adhered to provide what may be termed as the “layered concept” of security. Secret messages are generally transmitted in encrypted form over secure channels, thus presenting problems of key management and associated cost-overheads. An ID (identity) based cryptographic technique, derived from the Public Key concept is used in the proposed approach. Through the cryptographic approach presented in this paper, identification of the incoming unit can be achieved without the exchange of secret messages in encrypted form. Our work is further to Kwei Tu [1] but has the advantage of being highly secure with added merits of speed and compact implementation. Elliptic curves over a finite field have been chosen fcr implementation of E1-Gamal’s discrete logarithmic problem. Succeeding sections of this paper explain the following:
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA New Approach for Accurate Pricing of Reactive Power and Its Application to Cost Allocation in Deregulated Electricity Markets
Reactive power management plays an essential role in the secure operation of the power system as an ancillary service. Although in electricity markets, the particular attention is paid to active power, the reactive power also plays an important on total generation costs of electricity. On the other hand, as it is mainly confined to local consumption, to avoid market power and maintain the se...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملA Sensitive Novel Approach towards the Detection of 8-Hydroxyquinoline at Anionic Surfactant Modified Carbon Nanotube Based Biosensor: A Voltammetric Study
A rapid electrochemical technique was developed to determine 8-Hydroxyquinoline (8HQ). In the current study, the anionic surfactant Sodium lauryl sulfate (SLS) was immobilized on the multi-walled carbon nanotube (MWCNT) paste surface for the fabrication of electrode to detect 8HQ in phosphate buffer solution (PBS) of pH 7.0. The response of SLS modified carbon nanotube paste electrode (SLSMCNTP...
متن کامل