Abstract
Weather information provides a safe working environment by contributing to the economic activity of the nation, and plays role of the prevention of natural disasters, which can cause large scaled casualties and damage of property. Especially during times of war, weather information plays a more important role than strategy, tactics and information about trends of the enemy. Also, it plays an essential role for the taking off and landing of fighter jet and the sailing of warships. If weather information, which plays a major role in national security and economy, gets misused for cyber terrorism resulting false weather information, it could be a huge threat for national security and the economy. We propose a plan to safely transmit the measured value from meteorological sensors through a meteorological telecommunication network in order to guarantee the confidentiality and integrity of the data despite cyber-attacks. Also, such a plan allows one to produce reliable weather forecasts by performing mutual authentication through authentication devices. To make sure of this, one can apply an Identity Based Signature to ensure the integrity of measured data, and transmit the encrypted weather information with mutual authentication about the authentication devices. There are merits of this research: It is not necessary to manage authentication certificates unlike the Public Key Infrastructure methodology, and it provides a powerful security measure with the capability to be realized in a small scale computing environment, such as the meteorological observation system due to the low burden on managing keys.
Highlights
With the advanced information technology, people-oriented communications connecting people to life is changing into a man-to-machine and machine-to-machine environment
Processing speed We evaluated the effectiveness by comparing the Identity Based Signature and the public key- based signature for the transmission of meteorological data
Weather information is important information to most people regardless of their occupation, gender, or age; it is even directly related to the even national economy and security
Summary
With the advanced information technology, people-oriented communications connecting people to life is changing into a man-to-machine and machine-to-machine environment. When symmetric cryptography is utilized between the observation sensor and the gathering server, key interchanging problems, due to the replacing of devices during the emergency situation, such as obstacles, may arise, and in cases when the symmetry key is hijacked during wartime or due to an external attacker, it may be used maliciously for things such as falsifying the meteorological observation data (Padmavathi and Ranjitha Kumari 2013; Joux 2000) Identity based encryption This system is a type of public key algorithm, and it has the advantage that it does not require validating the efficiency of the public keys due to the fact that it utilizes specific information already disclosed.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.