document title / titre du document TRP W ORK PLAN ... - emits - ESA
document title / titre du document TRP W ORK PLAN ... - emits - ESA
document title / titre du document TRP W ORK PLAN ... - emits - ESA
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>TRP</strong> Work Plan 2005-2007<br />
Description of Activities<br />
TEC-SB/7935/dc<br />
12/Feb/09<br />
<strong>TRP</strong> Reference:<br />
T104-11FP<br />
Autonomous High Data Rate Secured Downlink System - Breadboard (Old <strong>title</strong>: High<br />
Title:<br />
Data Rate Downlink Data Processor Chain – Breadboard)<br />
Security for Earth Observation (EO) systems including the space borne assets is one of the urgently to be addressed topics.<br />
In addition guarantee the safety of the space assets the integrity and originality of the data from observation by space borne<br />
platforms up to delivery to users on ground needs to be implemented. This classically includes security in uplinks and<br />
downlinks and after reception on ground.<br />
A study on link protection for EO systems (recently con<strong>du</strong>cted by <strong>ESA</strong>, Contract No. 17176/03/NL/GS) showed, that currently<br />
no agreed security concept for the space/ground links exist. The existing <strong>ESA</strong> Packet Telecommand Decoder standard<br />
foresees only a very weak authentication scheme. Secure communication shall incorporate as minimum means for<br />
self-authentication, key agreement, message authentication and en-/decryption of telemetry data. Typically the high rate<br />
downlink is secured by encryption and message authentication. The encryption and authentication keys for the downlink are<br />
classically generated on ground and sent to the space platform via a command uplink, which needs then be highly secured.<br />
This is a feasible approach but requires the design of both a secured high rate downlink and a highly secured low rate up- and<br />
downlink. Also it requires a bi-directional communication link for the key exchange and authentication. Some ground stations<br />
are not providing real-time full <strong>du</strong>plex communication.<br />
A secured downlink system should be as far as feasible decoupled from the requirements of the command/control links, taking<br />
into account, that evaluation, standardization, development and implementation of a secured command and control link will<br />
take some years time from the current view.<br />
There are algorithms existing that provide secure key exchange and authentication by using a unidirectional link, only. Elliptic<br />
Curve (EC) based cryptography today is regarded as high secure implementation of the standard techniques. An EC based<br />
unidirectional scheme could provide the necessary level of security for a unidirectional link.<br />
The keys for encryption and authentication could in principle be generated on-board. This requires a cryptographically reliable<br />
key generator to be implemented space compliant.<br />
By combining both EC based unidirectional key exchange/authentication and on-board key generation an autonomous<br />
secured downlink system can be designed, which is decoupled from the security requirements of the command uplink. This<br />
could allow a straightforward “Sensor to User” end-to-end security concept.<br />
The currently used downlink systems provide some 100 Mbit/s data rate. The applied algorithms and protocols shall therefore<br />
be suitable for high rate implementation.<br />
The study objective is to identify alternative and optimised solutions for future applications in EO downlink systems and shall<br />
comprise following elements:<br />
• Analysis of Security requirements for downlink systems including the on ground part;<br />
• Design of a high rate secured downlink system with selection of appropriate algorithms and protocols;<br />
• Breadboard (BB) implementation of core technology to demonstrate feasibility of high rate application as well as space<br />
compliance.<br />
Deliverables:<br />
System Requirements Document, Breadboard of core elements + test report and test results evaluation.<br />
Current TRL: TRL1 Target TRL: TRL3-4 Application Need/Date: TRL5 by 2008-2009<br />
Application/Mission: EO, other programmes Contract Duration: 18 months<br />
SW Clause : - Dossier0 Ref.: T-7794<br />
Consistency with Harmonisation<br />
Roadmap and Conclusions:<br />
Page 28 of 227