For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Military vetronics consists of a variety of sub-systems which perform a myriad of functions. These sub-systems are connected together using gateways and backbone networks to provide the crew, the military and decision makers with realtime data, enabling information sharing. This integration of the vetronics architecture provides greater functionalities than an individual sub-system. However, this poses a potential risk from malicious attacks. For example, an attack on a safety-critical Drive-by-wire sub-system can affect the safety of the crew and compromise the mission. In this paper, we explore and carry out a feasibility study of applying elliptic curve digital signature algorithm on a safety-critical time-triggered protocol (TTP/C) to provide node authentication and message integrity. (5 pages)