Skip to main content
Top

2019 | OriginalPaper | Chapter

On the Security of MIL-STD-1553 Communication Bus

Authors : Orly Stan, Adi Cohen, Yuval Elovici, Asaf Shabtai

Published in: Security and Safety Interplay of Intelligent Software Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

MIL-STD-1553 is a military standard that defines the physical and logical layers, and a command/response time division multiplexing of a communication bus used in military and aerospace avionic platforms for more than 40 years. As a legacy platform, MIL-STD-1553 was designed for high level of fault tolerance while less attention was taken with regard to security. Recent studies already addressed the impact of successful cyber-attacks on aerospace vehicles that are implementing MIL-STD-1553. In this work we present a security analysis of MIL-STD-1553, which enumerates the assets and threats to the communication bus, as well as defines the attacker’s profile.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Chong, J., Pal, P., Atigetchi, M., Rubel, P., Webber, F.: Survivability architecture of a mission critical system: the DPASA example. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), December 2005, pp. 10, 504 Chong, J., Pal, P., Atigetchi, M., Rubel, P., Webber, F.: Survivability architecture of a mission critical system: the DPASA example. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), December 2005, pp. 10, 504
2.
go back to reference Data Device Corporation: MIL-STD-1553 Designer’s Guide (1998) Data Device Corporation: MIL-STD-1553 Designer’s Guide (1998)
3.
go back to reference Gillen, A., Shelton, J.: Introduction of 3910 high speed data bus. In: Military Communications Conference, MILCOM 1992, Conference Record. Communications-Fusing Command, Control and Intelligence, pp. 956–960. IEEE (1992) Gillen, A., Shelton, J.: Introduction of 3910 high speed data bus. In: Military Communications Conference, MILCOM 1992, Conference Record. Communications-Fusing Command, Control and Intelligence, pp. 956–960. IEEE (1992)
4.
go back to reference Gligor, V.D.: A note on the denial-of-service problem. In: IEEE Symposium on Security and Privacy, pp. 139–149 (1983) Gligor, V.D.: A note on the denial-of-service problem. In: IEEE Symposium on Security and Privacy, pp. 139–149 (1983)
5.
go back to reference Jiang, W., Guo, W., Sang, N.: Periodic real-time message scheduling for confidentiality-aware cyber-physical system in wireless networks. In: 2010 Fifth International Conference on Frontier of Computer Science and Technology, pp. 355–360, August 2010 Jiang, W., Guo, W., Sang, N.: Periodic real-time message scheduling for confidentiality-aware cyber-physical system in wireless networks. In: 2010 Fifth International Conference on Frontier of Computer Science and Technology, pp. 355–360, August 2010
7.
go back to reference Lindsay, J.R.: Stuxnet and the limits of cyber warfare. Secur. Stud. 22(3), 365–404 (2013)CrossRef Lindsay, J.R.: Stuxnet and the limits of cyber warfare. Secur. Stud. 22(3), 365–404 (2013)CrossRef
8.
go back to reference Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)CrossRef Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)CrossRef
9.
go back to reference Mayoux, J.-J.: The data bus of the next generation European fighters. In: Proceedings of the IEEE 1993 National Aerospace and Electronics Conference, NAECON 1993, pp. 152–156. IEEE (1993) Mayoux, J.-J.: The data bus of the next generation European fighters. In: Proceedings of the IEEE 1993 National Aerospace and Electronics Conference, NAECON 1993, pp. 152–156. IEEE (1993)
10.
go back to reference McGraw, R.M., Fowler, M.J., Umphress, D., MacDonald, R.A.: Cyber threat impact assessment and analysis for space vehicle architectures. In: International Society for Optics and Photonics SPIE Defense+ Security, p. 90850K (2014) McGraw, R.M., Fowler, M.J., Umphress, D., MacDonald, R.A.: Cyber threat impact assessment and analysis for space vehicle architectures. In: International Society for Optics and Photonics SPIE Defense+ Security, p. 90850K (2014)
11.
go back to reference Miller, B., Rowe, D.: A survey SCADA of and critical infrastructure incidents. In: Proceedings of the 1st Annual Conference on Research in Information Technology, RIIT 2012, pp. 51–56. ACM (2012) Miller, B., Rowe, D.: A survey SCADA of and critical infrastructure incidents. In: Proceedings of the 1st Annual Conference on Research in Information Technology, RIIT 2012, pp. 51–56. ACM (2012)
12.
go back to reference Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: Preprints of the 1st Workshop on Secure Control Systems, pp. 1–6 (2010) Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: Preprints of the 1st Workshop on Secure Control Systems, pp. 1–6 (2010)
13.
go back to reference Murdock, J.K., Koenig, J.R.: Open systems avionics network to replace MIL-STD-1553. In: Proceedings of 19th Digital Avionics Systems Conference, 19th DASC (Cat. No. 00CH37126), vol. 1, pp. 4E5/1–4E5/6, October 2000 Murdock, J.K., Koenig, J.R.: Open systems avionics network to replace MIL-STD-1553. In: Proceedings of 19th Digital Avionics Systems Conference, 19th DASC (Cat. No. 00CH37126), vol. 1, pp. 4E5/1–4E5/6, October 2000
14.
go back to reference Nguyen, T.D.: Towards MIL-STD-1553B covert channel analysis. Technical report, Naval Postgraduate School, Monterey, California (2015) Nguyen, T.D.: Towards MIL-STD-1553B covert channel analysis. Technical report, Naval Postgraduate School, Monterey, California (2015)
15.
go back to reference US Department of Defense: Fiber Optics Mechanization of an Aircraft Internal Time Division Command/Response Multiplex Data Bus, May 1988 US Department of Defense: Fiber Optics Mechanization of an Aircraft Internal Time Division Command/Response Multiplex Data Bus, May 1988
16.
go back to reference Vai, M., et al.: Systems design of cybersecurity in embedded systems. In: 2016 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1–6, September 2016 Vai, M., et al.: Systems design of cybersecurity in embedded systems. In: 2016 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1–6, September 2016
Metadata
Title
On the Security of MIL-STD-1553 Communication Bus
Authors
Orly Stan
Adi Cohen
Yuval Elovici
Asaf Shabtai
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-16874-2_11

Premium Partner