The goal of this section is to inform the reader about the state of security in aeronautical communications and the state security considerations applicable for all ATN/IPS traffic and to provide an overview of the LDACS link-layer security capabilities.
Aviation will require secure exchanges of data and voice messages for managing the air traffic flow safely through the airspaces all over the world. Historically, Communication Navigation Surveillance (CNS) wireless communications technology emerged from the military and a threat landscape where inferior technological and financial capabilities of adversaries were assumed [
STR2016]. The main communications method for ATC today is still an open analog voice broadcast within the aeronautical VHF band. Currently, information security is mainly procedural and based by using well-trained personnel and proven communications procedures. This communication method has been in service since 1948. However, the world has changed since the emergence of civil aeronautical CNS applications in the 70s.
Civil applications have significant lower spectrum available than military applications. This means that several military defense mechanisms such as frequency hopping or pilot symbol scrambling (and thus a defense-in-depth approach starting at the physical layer) are infeasible for civil systems. With the rise of cheap Software-Defined Radios (SDRs), the previously existing financial barrier is almost gone, and open source projects such as GNU radio [
GNU2021] allow for a new type of unsophisticated listener and possible attacker.
Most CNS technology developed in ICAO relies on open standards; thus, syntax and semantics of wireless digital aeronautical communications should be expected to be common knowledge for attackers. With increased digitization and automation of civil aviation, the human as control instance is being taken gradually out of the loop. Autonomous transport drones or single-piloted aircraft demonstrate this trend. However, without profound cybersecurity measures, such as authenticity and integrity checks of messages in-transit on the wireless link or mutual entity authentication, this lack of a control instance can prove disastrous. Thus, future digital communications will need additional embedded security features to fulfill modern information security requirements like authentication and integrity. These security features require sufficient bandwidth, which is beyond the capabilities of currently deployed VHF narrowband communications systems. For voice and data communications, sufficient data throughput capability is needed to support the security functions while not degrading performance. LDACS is a data link technology with sufficient bandwidth to incorporate security without losing too much user data throughput.
ICAO Doc 9896 [
ICAO2015] foresees transport layer security for all aeronautical data transmitted via the ATN/IPS, as described in ARINC 858 [
ARI2021]. This is realized via Datagram Transport Layer Security (DTLS) 1.3 [
RFC 9147].
LDACS also needs to comply with in-depth security requirements as stated in ARINC 858 for the radio access technologies transporting ATN/IPS data. These requirements imply that LDACS must provide Layer 2 security in addition to any higher-layer mechanisms. Specifically, ARINC 858 [
ARI2021] states that data links within the FCI need to provide
a secure channel between the airborne radio systems and the peer radio access endpoints on the ground [...] to ensure authentication and integrity of air-ground message exchanges in support of an overall defense-in-depth security strategy.
Overall, cybersecurity for CNS technology shall protect the following business goals [
MAE20181]:
-
Safety: The system must sufficiently mitigate attacks that contribute to safety hazards.
-
Flight regularity: The system must sufficiently mitigate attacks that contribute to delays, diversions, or cancelations of flights.
-
Protection of business interests: The system must sufficiently mitigate attacks that result in financial loss, reputation damage, disclosure of sensitive proprietary information, or disclosure of personal information.
To further analyze assets, derive threats, and create protection scenarios, several threat and risk analyses were performed for LDACS [
MAE20181] [
MAE20191]. These results allowed the derivation of security scope and objectives from the requirements and the conducted threat and risk analysis. Note, IPv6 security considerations are briefly discussed in
Section 9.7 while a summary of security requirements for link-layer candidates in the ATN/IPS is given in [
ARI2021], which states:
Since the communication radios connect to local airborne networks in the aircraft control domain, [...] the airborne radio systems represent the first point of entry for an external threat to the aircraft. Consequently, a secure channel between the airborne radio systems and the peer radio access endpoints on the ground is necessary to ensure authentication and integrity of air-ground message exchanges in support of an overall defense-in-depth security strategy.
Security considerations for LDACS are defined by the official SARPS document by ICAO [
ICAO2022]:
-
LDACS shall provide a capability to protect the availability and continuity of the system.
-
LDACS shall provide a capability including cryptographic mechanisms to protect the integrity of messages in transit.
-
LDACS shall provide a capability to ensure the authenticity of messages in transit.
-
LDACS should provide a capability for non-repudiation of origin for messages in transit.
-
LDACS should provide a capability to protect the confidentiality of messages in transit.
-
LDACS shall provide an authentication capability.
-
LDACS shall provide a capability to authorize the permitted actions of users of the system and to deny actions that are not explicitly authorized.
-
If LDACS provides interfaces to multiple domains, LDACS shall provide capability to prevent the propagation of intrusions within LDACS domains and towards external domains.
Work in 2022 includes a change request for these SARPS aims to limit the "non-repudiation of origin of messages in transit" requirement only to the authentication and key establishment messages at the beginning of every session.
These objectives were used to derive several security functions for LDACS required to be integrated in the LDACS cybersecurity architecture: Identification, Authentication, Authorization, Confidentiality, System Integrity, Data Integrity, Robustness, Reliability, Availability, and Key and Trust Management. Several works investigated possible measures to implement these security functions [
BIL2017] [
MAE20181] [
MAE20191].
The requirements lead to an LDACS security model, including different entities for identification, authentication, and authorization purposes ensuring integrity, authenticity, and confidentiality of data. A draft of the cybersecurity architecture of LDACS can be found in [
ICAO2022] and [
MAE20182], and respective updates can be found in [
MAE20191], [
MAE20192], [
MAE2020], and [
MAE2021].
A simplified LDACS architectural model requires the following entities: network operators such as the Societe Internationale de Telecommunications Aeronautiques (SITA) [
SIT2020] and ARINC [
ARI2020]; both entities provide access to the ground IPS network via an A/G LDACS router. This router is attached to an internal LDACS access network that connects via further AC-Rs to the different LDACS cell ranges, each controlled by a GS (serving one LDACS cell), with several interconnected GSs spanning a local LDACS access network. Via the A/G wireless LDACS data link AS, the aircraft is connected to the ground network. Via the aircraft's VI and network interface, the aircraft's data can be sent via the AS back to the GS, then to the LDACS local access network, AC-Rs, LDACS access network, A/G LDACS router, and finally to the ground IPS network [
ICAO2015].
LDACS needs specific identities for the AS, the GS, and the network operator. The aircraft itself can be identified using the 24-bit ICAO identifier of an aircraft [
ICAO2022], the call sign of that aircraft, or the recently founded privacy ICAO address of the Federal Aviation Administration (FAA) program with the same name [
FAA2020]. It is conceivable that the LDACS AS will use a combination of aircraft identification, radio component identification, and even operator feature identification to create a unique LDACS AS identification tag. Similar to a 4G's eNodeB-serving network identification tag, a GS could be identified using a similar field. The identification of the network operator is similar to 4G (e.g., E-Plus, AT&T, and TELUS), in the way that the aeronautical network operators are listed (e.g., ARINC [
ARI2020] and SITA [
SIT2020]).
In order to anchor trust within the system, all LDACS entities connected to the ground IPS network will be rooted in an LDACS-specific chain-of-trust and PKI solution, quite similar to AeroMACS's approach [
CRO2016]. These certificates, residing at the entities and incorporated in the LDACS PKI, provide proof of the ownership of their respective public key and include information about the identity of the owner and the digital signature of the entity that has verified the certificate's content. First, all ground infrastructures must mutually authenticate to each other, negotiate and derive keys, and then secure all ground connections. How this process is handled in detail is still an ongoing discussion. However, established methods to secure the user plane by IPsec [
RFC 4301] and IKEv2 [
RFC 7296] or the application layer via TLS 1.3 [
RFC 8446] are conceivable. The LDACS PKI with its chain-of-trust approach, digital certificates, and public entity keys lay the groundwork for this step. In a second step, the AS with the LDACS radio aboard approaches an LDACS cell and performs a cell-attachment procedure with the corresponding GS. This procedure consists of (1) the basic cell entry [
GRA2020] and (2) a MAKE procedure [
MAE2021].
Note that LDACS will foresee multiple security levels. To address the issue of the long service life of LDACS (i.e., possibly greater than 30 years) and the security of current pre-quantum cryptography, these security levels include pre-quantum and post-quantum cryptographic solutions. Limiting security data on the LDACS data link as much as possible to reserve as much space for actual user data transmission is key in the LDACS security architecture. This is also reflected in the underlying cryptography. Pre-quantum solutions will rely on elliptic curves [
NIST2013], while post-quantum solutions consider Falcon [
SON2021] [
MAE2021] or similar lightweight PQC signature schemes and CRYSTALS-KYBER or SABER as key establishment options [
AVA2021] [
ROY2020].
The key material from the previous step can then be used to protect LDACS Layer 2 communications via applying encryption and integrity protection measures on the SNP layer of the LDACS protocol stack. As LDACS transports AOC and ATS data, the integrity of that data is most important while confidentiality only needs to be applied to AOC data to protect business interests [
ICAO2022]. This possibility of providing low-layered confidentiality and integrity protection ensures a secure delivery of user data over the wireless link. Furthermore, it ensures integrity protection of LDACS control data.
In this part, considerations on IPv6 operational security in [
RFC 9099] and interrelations with the LDACS security additions are compared and evaluated to identify further protection demands. As IPv6 heavily relies on the Neighbor Discovery Protocol (NDP) [
RFC 4861], integrity and authenticity protection on the link layer, as provided by LDACS, already help mitigate spoofing and redirection attacks. However, to also mitigate the threat of remote DDoS attacks, neighbor solicitation rate-limiting is recommended by [
RFC 9099]. To prevent the threat of DDoS and DoS attacks in general on the LDACS access network, rate-limiting needs to be performed on each network node in the LDACS access network. One approach is to filter for the total amount of possible LDACS AS-GS traffic per cell (i.e., of up to 1.4 Mbit/s user data per cell and up to the amount of GS per service provider network times 1.4 Mbit/s).