Sleeping Encryption Unit in the Integrated Air Defence Systems
DOI:
https://doi.org/10.3849/aimt.01289Keywords:
crisis management, integrated air defence system (IADS), military mobility, Patriot PAC-3 usa, S-400 & S-500Abstract
This research introduces a new military crypto-cipher authentication model developed for an Integrated Air Defence System (IADS). This study focused on the encryption aspect that is built as a hidden cryptographic of a sleeping encryption unit (SEU) in an IADS. SEU is utilised as a sleeping unit under the control of manufacturer countries during wartime. SEU permits high access to manufacturer countries to remotely deactivate an IADS. This hidden unit identifies and verifies targets before targeting them, thereby preventing their destruction at a critical time. Algorithms and protocols assigned to this unit are often confidential, highly secret and undisclosed.
References
SUSEK, W., KNIOLA, M. and STEC, B. Buried Objects Detection Using Noise Radar. In Proceedings of the 22nd International Microwave and Radar Conference (MIKON). Poznan: IEEE, 2018, p. 461-463. https://doi.org/10.23919/MIKON.2018.8405256.
ANDERSSON, K. Modelling the Impact of Surface Emissivity on the Military Utility of Attack Aircraft. Aerospace Science and Technology, 2017, vol. 65, no. 17, p. 133-140. https://doi.org/10.1016/j.ast.2017.02.017.
BULLOCK, J.A., HADDOW, G.D. and COPPOLA, D.P. Introduction to Homeland Security Principles of All‐Hazards Risk Management.
Butterworth‐Heinemann, 2015, 760 p. ISBN 978-0-12-415802-3.
ROBARDS, M.D., SILBER, G., ADAMS, J., ARROYO, J., LORENZINI, D. and SCHWEHR, K. Conservation Science and Policy Applications of the Marine Vessel Automatic Identification System (AIS)‐A review. Bulletin of Marine Science, 2016, vol. 92, no. 1, p. 75-103. https://doi.org/10.5343/bms.2015.1034.
PELOSI, M. and HONEYCUTT, A.K. Cruise Missile Integrated Air Defense System Penetration: Modeling the S-400 System. International Journal of Aviation, Areonautics, and Aerospace, 2017, vol. 4, no. 3. https://doi.org/10.15394/ijaaa.2017.1104.
MARCUS, C., ANDERSSON, K.E. and ÅKERLIND, C. Balancing the Radar and Long Wavelength Infrared Signature Properties in Concept Analysis of Combat Aircraft – A Proof of Concept. Aerospace Science and Technology, 2017, vol. 71, p. 733-741. https://doi.org/10.1016/j.ast.2017.10.022.
SMESTAD, T., OHRA, H. and KNAPSKOG, A. ESM‐Sensors for Tactical Information in Air Defence Systems. In Proceedings of the Systems Concepts and Integration Panel (SCI) Symposium. Quebec: St. Joseph Corporation Company, 2001, 246 p. ISBN 92-837-1052-5.
ZOTOV, V. and GAO, X. Wide Area Search Munition Delivered by the Intermediate Carriers. In Proceedings of the 10th IEEE Conference on Signal Processing. Beijing: IEEE, 2010, p. 1964-1968. https://doi.org/10.1109/ICOSP.2010.5656053.
GRIFFITHS, H. Developments in Bistatic and Networked Radar. In Proceedings of the IEEE International Conference on Radar (CIE). Chengdu: IEEE, 2011, p. 10-13. https://doi.org/10.1109/CIE-Radar.2011.6159708.
MALIK, A.A., MAHBOOB, A., KHAN, A. and ZUBAIRI, J. Application of Cyber Security in Emerging C4ISR Systems. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, 2012, p. 223-258. https://doi.org/10.4018/978-1-60960-851-4.ch012.
KAWALEC, A., KLEMBOWSKI, W., WITCZAK, A. and MILOSZ, J. Military Surveillance Radars: From Fixed to Nonrotating Antennas. In Proceedings of the 16th International Radar Symposium (IRS). Dresden: IEEE, 2015, p. 967-972. https://doi.org/10.1109/IRS.2015.7226390.
FAM, A.T., KADLIMATTI, R. and QAZI, F.A. Multistatic Radar System Based on Accurate Signature Identification Via Micro‐positioning. In Proceedings of the IEEE Radar Conference. Cincinnati: IEEE, 2014, p. 1414‐1417. https://doi.org/10.1109/RADAR.2014.6875821.
AMIN, S., CLARK, T., OFFUTT, R. and SERENKO, K. Design of a Cyber Security Framework for ADS‐B Based Surveillance Systems. In Proceedings of the Systems and Information Engineering Design Symposium (SIEDS). Charlottesville: IEEE, 2014, p. 304-309. https://doi.org/10.1109/SIEDS.2014.6829910.
ARBATOV, A., DVORKIN, V. and BUBNOVA, N. Missile Defense: Confrontation and Cooperation. Moscow: Carnegie Moscow Center, 2013, 385 p. ISBN 978-5-905046-23-0.
EL-BADAWY, E.A., EL‐MASRY, W.A., MOKHTAR, M.A. and HAFEZ, A.S. A Secured Chaos Encrypted Mode‐S Aircraft Identification Friend or Foe (IFF) System. In Proceedings of the 4th IEEE Conference on Signal Processing and Communication Systems. Gold Coast: IEEE, 2010, p. 1-6. DOI 10.1109/ICSPCS. 2010.5709756.
ARIFIN, B., ROSS, E. and BRODSKY, Y. Data Security in a Ship Detection and Identification System. In Proceedings of the 5th IEEE Conference on Recent Advances in Space Technologies (RAST). Istanbul: IEEE, 2011, p. 634-636. https://doi.org/10.1109/RAST.2011.5966915.
WANG, S. and QIAO, Y. Research on Intelligent Radar Detection Model in Complex CGF Air Combat Environment. In Proceedings of the10th IEEE Conference on Intelligent Human‐Machine Systems and Cybernetics (IHMSC). Hangzhou: IEEE, 2018, vol. 1, p. 373-376. https://doi.org/10.1109/IHMSC.2018.00093.
LESTRIANDOKO, N.H., JUHANA, T. and MUNIR, R. Security System for Surveillance Radar Network Communication Using Chaos Algorithm. In Proceedings of the 8th IEEE Conference on Telecommunication Systems Services and Applications (TSSA). Kuta: IEEE, 2014, p. 1-6. https://doi.org/10.1109/TSSA.2014.7065947.
KARAKO, T., WILLIAMS, I. and RUMBAUGH, W. Missile Defense 2020: Next Steps for Defending the Homeland, Center for Strategic and International Studies. Rhode Island Avenue: Rowman & Littlefield, 2017. 160 p. ISBN 978-1-4422-7990-2.
DAWOOD, O.A., RAHMA, A.M.S., and HOSSEN, A.M.J.A. The Euphrates Cipher. International Journal of Computer Science Issues, 2015, vol. 12, no. 2, p. 154-160. ISSN 1694-0784.
DAWOOD, O.A., RAHMA, A.M.S. and HOSSEN, A.M.J.A. The New Block Cipher Design (Tigris Cipher). International Journal of Computer Network and Information Security, 2015, vol. 12, p. 10-18. https://doi.org/10.5815/ijcnis.2015.12.02.
DAWOOD, O. A., RAHMA, A.M.S. and HOSSEN, A.M.J.A. New Symmetric Cipher Fast Algorithm of Revertible Operations’ Queen (FAROQ) Cipher. International Journal of Computer Network and Information Security, 2017, vol. 9, no. 4, p. 29-36. https://doi.org/10.5815/ijcnis.2017.04.04.
SAGHEER, A.M., AL‐RAWI, S.S. and DAWOOD, O.A. Proposing of Developed Advance Encryption Standard. In Proceedings of the 4th IEEE Conference on Developments in eSystems Engineering. Dubai: IEEE, 2011, p. 197-202. https://doi.org/10.1109/DeSE.2011.74.
DI LALLO, A., FARINA, A., FULCOLI, R., STILE, A., TIMMONERI, L. and VIGILANTE, D.A. Real Time Test Bed for 2D and 3D Multi‐radar Tracking and Data Fusion with Application to Border Control. In Proceedings of the 1th IEEE Conference on Radar (CIE). Shanghai: IEEE, 2006, p. 1-6. https://doi.org/10.1109/ICR.2006.343162.
HOEKSTRA, W.E. Tactical Data Links and Interoperability, The Glue between Systems [Research Report]. [on line]. Netherlands: Defense Technical Information Center Compilation Part Notice ADPO10859, 2001, 9 p. Available from: https://pdfs.semanticscholar.org/42d1/596f87c4002b9c3a784bd7b1bab75ae9fcc3.pdf?_ga=2.14963382.1892544529.1561572117-1139765700.1558626705.
FROGGATT, T.R. Radar Interoperability with Modern Multi‐Function Radars – A case study, In Proceedings of the International Conference on Radar Systems (IET). Edinburgh: IEEE, 2007, p. 1-5. https://doi.org/10.1049/cp:20070626.
OUYANG, Y.C., JANG, C.B. and CHEN, H.T. A Secure Authentication Policy for UMTS and WLAN Interworking. In Proceedings of the International Conference on Communications. Glasgow: IEEE, 2007, p. 1552-1557. https://doi.org/10.1109/ICC.2007.260.
SCIENCES, E., WALES, S., ADELAIDE, C. and PERTH, C. Interoperability of Multi‐Frequency SAR Data for Forest Information Extraction in Support of National MRV Systems. In Proceedings of the International Geoscience and Remote Sensing Symposium. Munich: IEEE, 2012, p. 3166-3169. https://doi.org/10.1109/IGARSS.2012.6350752.
BAYLIS, J., LIDL, R. and NIEDERREITER, H. Introduction to Finite Fields and Their Applications. The Mathematical Gazette, 2007, vol. 72, no. 462, p. 320-335. https://doi.org/10.2307/3619969.
DAEMEN, J. and RIJMEN, V. The Design of Rijndael: AES‐the Advanced Encryption Standard. Berlin: Springer, 2002, 238 p. ISBN 978-3-540-42580-9.
Downloads
Published
License
Copyright (c) 2019 Advances in Military Technology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Users can use, reuse and build upon the material published in the journal for any purpose, even commercially.