30.12.2014 Views

document title / titre du document TRP W ORK PLAN ... - emits - ESA

document title / titre du document TRP W ORK PLAN ... - emits - ESA

document title / titre du document TRP W ORK PLAN ... - emits - ESA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>TRP</strong> Work Plan 2005-2007<br />

Description of Activities<br />

TEC-SB/7935/dc<br />

12/Feb/09<br />

<strong>TRP</strong> Reference:<br />

T104-11FP<br />

Autonomous High Data Rate Secured Downlink System - Breadboard (Old <strong>title</strong>: High<br />

Title:<br />

Data Rate Downlink Data Processor Chain – Breadboard)<br />

Security for Earth Observation (EO) systems including the space borne assets is one of the urgently to be addressed topics.<br />

In addition guarantee the safety of the space assets the integrity and originality of the data from observation by space borne<br />

platforms up to delivery to users on ground needs to be implemented. This classically includes security in uplinks and<br />

downlinks and after reception on ground.<br />

A study on link protection for EO systems (recently con<strong>du</strong>cted by <strong>ESA</strong>, Contract No. 17176/03/NL/GS) showed, that currently<br />

no agreed security concept for the space/ground links exist. The existing <strong>ESA</strong> Packet Telecommand Decoder standard<br />

foresees only a very weak authentication scheme. Secure communication shall incorporate as minimum means for<br />

self-authentication, key agreement, message authentication and en-/decryption of telemetry data. Typically the high rate<br />

downlink is secured by encryption and message authentication. The encryption and authentication keys for the downlink are<br />

classically generated on ground and sent to the space platform via a command uplink, which needs then be highly secured.<br />

This is a feasible approach but requires the design of both a secured high rate downlink and a highly secured low rate up- and<br />

downlink. Also it requires a bi-directional communication link for the key exchange and authentication. Some ground stations<br />

are not providing real-time full <strong>du</strong>plex communication.<br />

A secured downlink system should be as far as feasible decoupled from the requirements of the command/control links, taking<br />

into account, that evaluation, standardization, development and implementation of a secured command and control link will<br />

take some years time from the current view.<br />

There are algorithms existing that provide secure key exchange and authentication by using a unidirectional link, only. Elliptic<br />

Curve (EC) based cryptography today is regarded as high secure implementation of the standard techniques. An EC based<br />

unidirectional scheme could provide the necessary level of security for a unidirectional link.<br />

The keys for encryption and authentication could in principle be generated on-board. This requires a cryptographically reliable<br />

key generator to be implemented space compliant.<br />

By combining both EC based unidirectional key exchange/authentication and on-board key generation an autonomous<br />

secured downlink system can be designed, which is decoupled from the security requirements of the command uplink. This<br />

could allow a straightforward “Sensor to User” end-to-end security concept.<br />

The currently used downlink systems provide some 100 Mbit/s data rate. The applied algorithms and protocols shall therefore<br />

be suitable for high rate implementation.<br />

The study objective is to identify alternative and optimised solutions for future applications in EO downlink systems and shall<br />

comprise following elements:<br />

• Analysis of Security requirements for downlink systems including the on ground part;<br />

• Design of a high rate secured downlink system with selection of appropriate algorithms and protocols;<br />

• Breadboard (BB) implementation of core technology to demonstrate feasibility of high rate application as well as space<br />

compliance.<br />

Deliverables:<br />

System Requirements Document, Breadboard of core elements + test report and test results evaluation.<br />

Current TRL: TRL1 Target TRL: TRL3-4 Application Need/Date: TRL5 by 2008-2009<br />

Application/Mission: EO, other programmes Contract Duration: 18 months<br />

SW Clause : - Dossier0 Ref.: T-7794<br />

Consistency with Harmonisation<br />

Roadmap and Conclusions:<br />

Page 28 of 227

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!