Michael Neale - The Security Network

advertisement
Unmanned Aircraft Systems
Communications Security
Michael Neale – RTCA SC203 Control and Communications Chair
1
Overview
• RTCA and Special Committee 203
• Unmanned Aircraft Communications
• Security Requirements
• Risk Assessment Process
• Current Status of SC 203 Security assessment
2
Who are RTCA and What is Special Committee 203?
• RTCA
– RTCA functions as a Federal Advisory Committee.
Its consensus-based recommendations are used
by the Federal Aviation Administration (FAA) as
the basis for policy, program, and regulatory
decisions and by the private sector as the basis
for development, investment and other business
decisions.
• Special Committee 203
– Tasked with developing recommended standards
for Unmanned Aircraft Systems (UAS), Sense and
Avoid and Control and Communications.
3
The UAS Market
• UAS quantity estimates for the US National Airspace
• Substantial quantities of UA will be in operation by
2025/2030
Government
market growth
levels out in
2020
Commercial
market growth is
low until
certification
regulations are in
place
4
Line Of Sight Operational View
OPTIONAL RELAY UA
MISSION UA
LOS DATALINK
TERMINAL
MANNED AIRCRAFT
DIRECT DISSEMINATION AND
PAYLOAD CONTROL
CONTROL STATION & PILOT
DIRECT DISSEMINATION
5
Beyond Line Of Sight Operational View
SATELLITE
MISSION UA
DISTANT
USERS
SECURE
NETWORK
MANNED AIRCRAFT
DIRECT DISSEMINATION
AND PAYLOAD CONTROL
DISTANT
CONTROL
STATION & PILOT
COMMAND CENTER
TAKE OFF AND
LANDING CS & PILOT
DIRECT DISSEMINATION
6
UAS Internal and External Information Exchange
ATC
ATC Ground Surveillance
Transponder
ADS-B
ADS-R
TIS-B
Navigation
FIS-B
ADS-C
Clearances
Status
Flight Plan Requests
COMMUNICATIONS
(VOICE AND DATA)
UAS
Telecommands
UA
GPS VOR
DME ILS
CONTROL
PILOT
Party Line
(Voice)
Telemetry
TCAS
ADS-B
Weather
Sense
and
Avoid
Cooperative and
Non Cooperative
Objects
7
ACL
ACM
AMC
ATSA-ITP
COTRAC
D-ATIS
DCL
D-FLUP
DLIC
D-OTIS
D-RVR
D-TAXI
FLIPNT
NOTAM
VOLMET
4DTRAD
AIS
Dispatches
Flight
Planning
Owner Operator
or
Mission Controller
Other Airspace
Users
Communications Security Requirements
Required Communications
Security Performance
Confidentiality
Availability
Integrity
8
Security Threat
Eavesdropping and
Exploitation
Jamming and
Denial of Service
Spoofing and
Non-Repudiation
Currently used Security Controls
• Intercept and Detection
– Reduce power spectral density on any particular
frequency
– Reduce power spectral density in any nonrequired direction
• Exploitation
– Encryption - NSA Type 1, Triple DES, AES, HAIPE
• Physical Security
– Guarding Control Station and Unmanned Aircraft
9
UAS Control Link Security
• What level of communications security
will be required?
– FAA currently does not have clear UAS security
policy so cannot provide guidance on required
levels of risk
– No national or international agreement on
likelihoods of exploitation of UAS Control Link
vulnerabilities
– Some encryption methods may not be viable
 Shared key systems may be impractical to use in
commercial applications due to key management
logistics
10
Security Law and Regulations
USA
11
•
Federal Information Security
Management Act (FISMA)
•
Federal Information Processing
Standards (FIPS)
–
Publication 199 - standards for
security
–
Categorization of federal
information and information
systems
•
National Institute of Standards and
Technology Special Publication
series SP-800
•
FAA Order 1370.82
EUROPE
•
UAS have not yet been considered as a
core element of current aviation security
development work
•
Safeguarding International Civil Aviation
Against Acts of Unlawful Interference
(SARP)
–
•
ICAO Annex 17 to the Convention on
International Civil Aviation on Security
Security Assessment Methodology in
NATO/ Eurocontrol ATM Security
Coordination Group (NEASCOG)
FISMA Security Assessment Process
• Determine security category for the UAS system
– Impact on confidentiality, integrity and availability
– High, moderate or low
• Determine the accreditation boundary
• Select security controls
• Perform risk assessment
– Identify threats, vulnerabilities, likelihoods, impacts
– Determine risk and recommend security controls
• Develop security plan
• Implement security controls
• Assess security controls
• Authorize system operation
• Monitor ongoing performance
12
Risk Assessment
• Can a Threat exploit a Vulnerability?
– Given enough time and money vulnerabilites
can be exploited
– Can the security control be strong enough to
deter the threat from exploiting the vulnerability
• Risk is a combination of Likelihood and
Impact
– Likelihood of a threat exercising a
vulnerability
 Frequent, Probable, Remote, Extrememly Remote, Extremely
Improbable.
– Impact if vulnerability is exploited
 High-Catastrophic, High-Severe, Medium, Low, None
13
Risk Assessment
• Must protect against any vulnerability
where impact is high even if likelihood is
extremely improbable
– NAS safety levels are very high
– Focussed malevolent activity
• Must protect against vulnerabilites where
likelihood is frequent even if impact is low
– Nuisance hacker
14
UAS Security Considerations
• Assess threats from operational scenarios
– Define levels of risk required to maintain National
Airspace safety based on threat likelihood and
impact effect on confidentiality, availability and
integrity
• Evaluate Mitigations
– Crypto security strength
– Key distribution
– Impact on bandwidth requirements
– Infrastructure, logistics and cost
• Security
– Gain concensus on international security levels
– Agree on likelihoods and impacts
15
Support Your Standards Development Organization
• This presentaion is based on the work of a number of
people. Further detail can be found in the following
RTCA SC-203 documents;
•
RTCA SC-203 WG2 002 - UAS Control and Communicaitions Security
Considerations
•
RTCA SC-203 WG2 010 - Approach for Certification and Accreditaiton Analysis
for Security of the Control and Communications Link for Unmanned Aircraft
Systems.
• RTCA SC-203 Control and Communications Working
Group
– Contact Michael Neale - michael.neale@uav.com
16
Download