Military vetronics consists of a variety of sub-systems which perform a myriad of functions. These sub-systems are connected together using gateways and backbone networks to provide the crew, the military and decision makers with real-time data, enabling information sharing. This integration of the vetronics architecture provides greater functionalities than an individual sub-system. However, this poses a potential risk from malicious attacks. For example, an attack on a safety-critical Drive-by-wire sub-system can affect the safety of the crew and compromise the mission. In this paper, we explore and carry out a feasibility study of applying elliptic curve digital signature algorithm on a safety-critical time-triggered protocol (TTP/C) to provide node authentication and message integrity.
|Title of host publication||7th IET International Conference on System Safety, Incorporating the Cyber Security Conference 2012|
|Publisher||Institution of Engineering and Technology|
|Publication status||Published - 1 Jan 2012|
|Event||7th IET International Conference on System Safety, Incorporating the Cyber Security Conference 2012 - Edinburgh, United Kingdom|
Duration: 15 Oct 2012 → 18 Oct 2012
|Conference||7th IET International Conference on System Safety, Incorporating the Cyber Security Conference 2012|
|Period||15/10/12 → 18/10/12|