[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Proposal of on-Line Key Management System Solutions for Railway Applications Based on Asymmetric Cryptography

  • Conference paper
  • First Online:
Tools of Transport Telematics (TST 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 531))

Included in the following conference series:

Abstract

This article is devoted to the transmission of safety-related messages via open transmission system in application with ETCS (European Train Control System) system Level - L2 using cryptographic protocol Euroradio. Authors in this article describe conceptual proposal of on-line key management system managing the keys of all entities included in communication in the range of domains in safe manner. Proposed KMS (Key Management System) assumes the use of asymmetric cryptography. In practical part are analyzed ideological solutions of the use of public keys within the communication of ETCS system entities in two neighboring domains. Generated keys of proposed KMS hierarchical architecture were simulated for the ECC (Elliptic Curve Cryptography) algorithm, specifically for Koblitz curves in the software tool Cryptool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mikulski, J.: Telematic technologies in transportation. In: Janecki, R., Sierpiński, G. (eds.) Contemporary Transportation Systems. Selected Theoretical and Practical Problems. New Culture of mobility, pp. 131–143. Publishing House of the Silesian University of Technology. Monograph no. 324, Gliwice (2011)

    Google Scholar 

  2. Franeková, M., Rástočný, K., Janota, A., Chrtiansky, P.: Safety analysis of cryptography mechanisms used in GSM for railway. In: International Journal of Engineering: Annals of Faculty Engineering Hunedoara. Romania. Tome III, ISSN 1584-2665 (2011)

    Google Scholar 

  3. EN 50159: Railway applications: Communication, signalling, andprocessing systems. Safety-related communication in closed and open transmission systems, CENELEC (2010)

    Google Scholar 

  4. Zahradník, J., Rástočný, K.: Safety of railway interlocking systems. In: Slovak, EDIS, ISBN 80-8070-546-1, Žilina (2006)

    Google Scholar 

  5. Franeková, M., et al.: Safety communication of industrial networks. Monograph. In: Slovak, EDIS - ŽU Žilina, ISBN 978-80-8070-715-6 (2007)

    Google Scholar 

  6. http://www.cs.cas.cz/portal/AlgoMath/MathematicalAnalysis/Inequalities/BachmannLandauNotation.htm. Accessed 16 January 2015

  7. UNISIG Subset 038 v2.1.9. Off line key management FIS (2005)

    Google Scholar 

  8. UNISIG Subset-037 v2.3.0: Euroradio FIS (2005)

    Google Scholar 

  9. Franeková, M., Voštenák, M.: Proposal of key management system for ETCSLevel 2. In: Scientific International Journal Mechanics, Transport, Communications, Sofia, Bulgaria. Issue 2/2010. UK 7.1-Uk.7.7. ISSN 1312-3823 (2010)

    Google Scholar 

  10. ANSI X9.52: Triple Data Encryption Algorithm Modes of Operation (1998)

    Google Scholar 

  11. FIPS 186-3: Digital Signature Standard (2012)

    Google Scholar 

  12. Voštenák, M.: Key management for ETCS system. Diploma work, University of Žilina (2010)

    Google Scholar 

  13. Sachin, M., Kumar, D.: Implementation and analysis of AES, DES and Triple DES on GSM Network. IJCSNS Int. J. Comput. Sci. Netw. Secur. 10(1), 298–303 (2010)

    Google Scholar 

  14. Gallo, P.: Enhanced authentication mechanisms based on elliptic curves, Ph.D. work, TU Košice, Slovakia. In: English (2014)

    Google Scholar 

  15. Mikulski, J.: Analiza zagrożeń pól magnetycznych w transporcie, Logistyka nr 3, 2009 (2009) CD-ROM

    Google Scholar 

Download references

Acknowledgement

This work has been supported by the Educational Grant Agency of the Slovak Republic (KEGA) Number: 008ŽU-4/2015: Innovation of HW and SW tools and methods of laboratory education focused on safety aspects of ICT within safety critical applications of processes control.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mária Franeková .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Franeková, M., Lüley, P., Rástočný, K., Ždánsky, J. (2015). Proposal of on-Line Key Management System Solutions for Railway Applications Based on Asymmetric Cryptography. In: Mikulski, J. (eds) Tools of Transport Telematics. TST 2015. Communications in Computer and Information Science, vol 531. Springer, Cham. https://doi.org/10.1007/978-3-319-24577-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24577-5_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24576-8

  • Online ISBN: 978-3-319-24577-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics