Security Threat Analysis of Critical Information Transmitted by the ALS System Based on the Radio Channel

The transition to the use of a radio channel for the transfer of critical information in automatic locomotive signaling (ALS) systems complicates the security of the transportation process, because in this case conditions are created for obtaining unauthorized access to the communication channel fro...

Full description

Bibliographic Details
Main Author: Alexander M. Korotin
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2017-06-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/104
Description
Summary:The transition to the use of a radio channel for the transfer of critical information in automatic locomotive signaling (ALS) systems complicates the security of the transportation process, because in this case conditions are created for obtaining unauthorized access to the communication channel from outside the controlled area. That’s why it seems advisable to solve the problem of identifying security threats of critical information transmitted by the automatic locomotive signaling system based on the radio channel (ALSR), the implementation of which is likely to disrupt the safety of the transportation process. The solution of this task is possible by analyzing security threats of critical information, determining the degree of their influence on the transportation process and developing violator model. The article shows that a security breach of the transportation process is possible in case of violation of the responsible information integrity. A model of violator of critical information security was developed using methodical documents of FSTEC of Russia. It was concluded that the threats from the internal violator for traditional automatic locomotive signaling systems and ALSR systems coincide. A list of security threats of sensitive information was developed, directed to violating the security of the transportation process by an external violator. The results obtained in the article can be used to study the safety of ALSR systems, to analyze existing solutions for protecting critical information transmitted by ALSR, or to develop new methods of protection.
ISSN:2074-7128
2074-7136