Sleeping Encryption Unit in the Integrated Air Defence Systems

Authors

  • Omar Abdulrahman Dawood College of Computer Sciences and Information Technology, University Of Anbar, Anbar, Iraq
  • Hussein Almulla College of Computer Sciences and Information Technology, University Of Anbar, Anbar, Iraq
  • Suleman Khan Department of Computer and Information Sciences, Northumbria University, Newcastle, UK

DOI:

https://doi.org/10.3849/aimt.01289

Keywords:

crisis management, integrated air defence system (IADS), military mobility, Patriot PAC-3 usa, S-400 & S-500

Abstract

This research introduces a new military crypto-cipher authentication model developed for an Integrated Air Defence System (IADS). This study focused on the encryption aspect that is built as a hidden cryptographic of a sleeping encryption unit (SEU) in an IADS. SEU is utilised as a sleeping unit under the control of manufacturer countries during wartime. SEU permits high access to manufacturer countries to remotely deactivate an IADS. This hidden unit identifies and verifies targets before targeting them, thereby preventing their destruction at a critical time. Algorithms and protocols assigned to this unit are often confidential, highly secret and undisclosed.

 

 

Author Biography

Omar Abdulrahman Dawood, College of Computer Sciences and Information Technology, University Of Anbar, Anbar, Iraq

Omar A. Dawood, Computer Science Department, University of Anbar, Anbar City, Iraq, phone: 009647905884333, E-mail: the_lionofclub@yahoo.com,  Omar-Abdulrahman@uoanbar.edu.iq

orcid.org/0000-0003-3276-602X

 

References

SUSEK, W., KNIOLA, M. and STEC, B. Buried Objects Detection Using Noise Radar. In Proceedings of the 22nd International Microwave and Radar Conference (MIKON). Poznan: IEEE, 2018, p. 461-463. https://doi.org/10.23919/MIKON.2018.8405256.

ANDERSSON, K. Modelling the Impact of Surface Emissivity on the Military Utility of Attack Aircraft. Aerospace Science and Technology, 2017, vol. 65, no. 17, p. 133-140. https://doi.org/10.1016/j.ast.2017.02.017.

BULLOCK, J.A., HADDOW, G.D. and COPPOLA, D.P. Introduction to Homeland Security Principles of All‐Hazards Risk Management.

Butterworth‐Heinemann, 2015, 760 p. ISBN 978-0-12-415802-3.

ROBARDS, M.D., SILBER, G., ADAMS, J., ARROYO, J., LORENZINI, D. and SCHWEHR, K. Conservation Science and Policy Applications of the Marine Vessel Automatic Identification System (AIS)‐A review. Bulletin of Marine Science, 2016, vol. 92, no. 1, p. 75-103. https://doi.org/10.5343/bms.2015.1034.

PELOSI, M. and HONEYCUTT, A.K. Cruise Missile Integrated Air Defense System Penetration: Modeling the S-400 System. International Journal of Aviation, Areonautics, and Aerospace, 2017, vol. 4, no. 3. https://doi.org/10.15394/ijaaa.2017.1104.

MARCUS, C., ANDERSSON, K.E. and ÅKERLIND, C. Balancing the Radar and Long Wavelength Infrared Signature Properties in Concept Analysis of Combat Aircraft – A Proof of Concept. Aerospace Science and Technology, 2017, vol. 71, p. 733-741. https://doi.org/10.1016/j.ast.2017.10.022.

SMESTAD, T., OHRA, H. and KNAPSKOG, A. ESM‐Sensors for Tactical Information in Air Defence Systems. In Proceedings of the Systems Concepts and Integration Panel (SCI) Symposium. Quebec: St. Joseph Corporation Company, 2001, 246 p. ISBN 92-837-1052-5.

ZOTOV, V. and GAO, X. Wide Area Search Munition Delivered by the Intermediate Carriers. In Proceedings of the 10th IEEE Conference on Signal Processing. Beijing: IEEE, 2010, p. 1964-1968. https://doi.org/10.1109/ICOSP.2010.5656053.

GRIFFITHS, H. Developments in Bistatic and Networked Radar. In Proceedings of the IEEE International Conference on Radar (CIE). Chengdu: IEEE, 2011, p. 10-13. https://doi.org/10.1109/CIE-Radar.2011.6159708.

MALIK, A.A., MAHBOOB, A., KHAN, A. and ZUBAIRI, J. Application of Cyber Security in Emerging C4ISR Systems. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, 2012, p. 223-258. https://doi.org/10.4018/978-1-60960-851-4.ch012.

KAWALEC, A., KLEMBOWSKI, W., WITCZAK, A. and MILOSZ, J. Military Surveillance Radars: From Fixed to Nonrotating Antennas. In Proceedings of the 16th International Radar Symposium (IRS). Dresden: IEEE, 2015, p. 967-972. https://doi.org/10.1109/IRS.2015.7226390.

FAM, A.T., KADLIMATTI, R. and QAZI, F.A. Multistatic Radar System Based on Accurate Signature Identification Via Micro‐positioning. In Proceedings of the IEEE Radar Conference. Cincinnati: IEEE, 2014, p. 1414‐1417. https://doi.org/10.1109/RADAR.2014.6875821.

AMIN, S., CLARK, T., OFFUTT, R. and SERENKO, K. Design of a Cyber Security Framework for ADS‐B Based Surveillance Systems. In Proceedings of the Systems and Information Engineering Design Symposium (SIEDS). Charlottesville: IEEE, 2014, p. 304-309. https://doi.org/10.1109/SIEDS.2014.6829910.

ARBATOV, A., DVORKIN, V. and BUBNOVA, N. Missile Defense: Confrontation and Cooperation. Moscow: Carnegie Moscow Center, 2013, 385 p. ISBN 978-5-905046-23-0.

EL-BADAWY, E.A., EL‐MASRY, W.A., MOKHTAR, M.A. and HAFEZ, A.S. A Secured Chaos Encrypted Mode‐S Aircraft Identification Friend or Foe (IFF) System. In Proceedings of the 4th IEEE Conference on Signal Processing and Communication Systems. Gold Coast: IEEE, 2010, p. 1-6. DOI 10.1109/ICSPCS. 2010.5709756.

ARIFIN, B., ROSS, E. and BRODSKY, Y. Data Security in a Ship Detection and Identification System. In Proceedings of the 5th IEEE Conference on Recent Advances in Space Technologies (RAST). Istanbul: IEEE, 2011, p. 634-636. https://doi.org/10.1109/RAST.2011.5966915.

WANG, S. and QIAO, Y. Research on Intelligent Radar Detection Model in Complex CGF Air Combat Environment. In Proceedings of the10th IEEE Conference on Intelligent Human‐Machine Systems and Cybernetics (IHMSC). Hangzhou: IEEE, 2018, vol. 1, p. 373-376. https://doi.org/10.1109/IHMSC.2018.00093.

LESTRIANDOKO, N.H., JUHANA, T. and MUNIR, R. Security System for Surveillance Radar Network Communication Using Chaos Algorithm. In Proceedings of the 8th IEEE Conference on Telecommunication Systems Services and Applications (TSSA). Kuta: IEEE, 2014, p. 1-6. https://doi.org/10.1109/TSSA.2014.7065947.

KARAKO, T., WILLIAMS, I. and RUMBAUGH, W. Missile Defense 2020: Next Steps for Defending the Homeland, Center for Strategic and International Studies. Rhode Island Avenue: Rowman & Littlefield, 2017. 160 p. ISBN 978-1-4422-7990-2.

DAWOOD, O.A., RAHMA, A.M.S., and HOSSEN, A.M.J.A. The Euphrates Cipher. International Journal of Computer Science Issues, 2015, vol. 12, no. 2, p. 154-160. ISSN 1694-0784.

DAWOOD, O.A., RAHMA, A.M.S. and HOSSEN, A.M.J.A. The New Block Cipher Design (Tigris Cipher). International Journal of Computer Network and Information Security, 2015, vol. 12, p. 10-18. https://doi.org/10.5815/ijcnis.2015.12.02.

DAWOOD, O. A., RAHMA, A.M.S. and HOSSEN, A.M.J.A. New Symmetric Cipher Fast Algorithm of Revertible Operations’ Queen (FAROQ) Cipher. International Journal of Computer Network and Information Security, 2017, vol. 9, no. 4, p. 29-36. https://doi.org/10.5815/ijcnis.2017.04.04.

SAGHEER, A.M., AL‐RAWI, S.S. and DAWOOD, O.A. Proposing of Developed Advance Encryption Standard. In Proceedings of the 4th IEEE Conference on Developments in eSystems Engineering. Dubai: IEEE, 2011, p. 197-202. https://doi.org/10.1109/DeSE.2011.74.

DI LALLO, A., FARINA, A., FULCOLI, R., STILE, A., TIMMONERI, L. and VIGILANTE, D.A. Real Time Test Bed for 2D and 3D Multi‐radar Tracking and Data Fusion with Application to Border Control. In Proceedings of the 1th IEEE Conference on Radar (CIE). Shanghai: IEEE, 2006, p. 1-6. https://doi.org/10.1109/ICR.2006.343162.

HOEKSTRA, W.E. Tactical Data Links and Interoperability, The Glue between Systems [Research Report]. [on line]. Netherlands: Defense Technical Information Center Compilation Part Notice ADPO10859, 2001, 9 p. Available from: https://pdfs.semanticscholar.org/42d1/596f87c4002b9c3a784bd7b1bab75ae9fcc3.pdf?_ga=2.14963382.1892544529.1561572117-1139765700.1558626705.

FROGGATT, T.R. Radar Interoperability with Modern Multi‐Function Radars – A case study, In Proceedings of the International Conference on Radar Systems (IET). Edinburgh: IEEE, 2007, p. 1-5. https://doi.org/10.1049/cp:20070626.

OUYANG, Y.C., JANG, C.B. and CHEN, H.T. A Secure Authentication Policy for UMTS and WLAN Interworking. In Proceedings of the International Conference on Communications. Glasgow: IEEE, 2007, p. 1552-1557. https://doi.org/10.1109/ICC.2007.260.

SCIENCES, E., WALES, S., ADELAIDE, C. and PERTH, C. Interoperability of Multi‐Frequency SAR Data for Forest Information Extraction in Support of National MRV Systems. In Proceedings of the International Geoscience and Remote Sensing Symposium. Munich: IEEE, 2012, p. 3166-3169. https://doi.org/10.1109/IGARSS.2012.6350752.

BAYLIS, J., LIDL, R. and NIEDERREITER, H. Introduction to Finite Fields and Their Applications. The Mathematical Gazette, 2007, vol. 72, no. 462, p. 320-335. https://doi.org/10.2307/3619969.

DAEMEN, J. and RIJMEN, V. The Design of Rijndael: AES‐the Advanced Encryption Standard. Berlin: Springer, 2002, 238 p. ISBN 978-3-540-42580-9.

Downloads

Published

10-11-2019

How to Cite

Dawood, O. A., Almulla, H., & Khan, S. (2019). Sleeping Encryption Unit in the Integrated Air Defence Systems. Advances in Military Technology, 14(2), 331–346. https://doi.org/10.3849/aimt.01289

Issue

Section

Technical Information

Categories