Logo: to the web site of the Swedish Defence University

fhs.se
Change search
Link to record
Permanent link

Direct link
Dansarie, Marcus, doktorandORCID iD iconorcid.org/0000-0001-9246-0263
Alternative names
Publications (10 of 12) Show all publications
Dansarie, M. (2024). Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review. IEEE Access, 12, 91101-91126
Open this publication in new window or tab >>Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 91101-91126Article, review/survey (Refereed) Published
Abstract [en]

For applications where general-purpose communication systems, such as mobile telephony, do not satisfy user requirements, special-purpose digital wireless communication standards have been developed. Since these systems often support critical infrastructures, security issues can have far-reaching consequences. To study the extent of research on security issues in specialized communication standards, a systematic literature review was performed, using snowballing to maximize coverage. The found publications cover security issues in radio communication systems for three major areas: civil transportation, public safety and security, and telephony and satellite communication systems. The main results from the included publications are summarized. This is followed by an analysis that presents five common themes among the security issues: lack of encryption, lack of authentication, broken encryption, protocol vulnerabilities, and implementation vulnerabilities. Research tools and methods used across the different technology fields are systematized, showing that software-defined radio and open-source software appear to be enablers of research on the communication standards covered by the review. The systematization also reveals that the application of research methods to different standards is spotty. Finally, numerous open research directions are pointed out, including the need for more holistic research that goes beyond just finding technical flaws in single standards.

Keywords
Critical infrastructure, cybersecurity, radio communication systems, security, standards, systematic review.
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-12650 (URN)10.1109/access.2024.3420091 (DOI)
Available from: 2024-07-05 Created: 2024-07-05 Last updated: 2024-12-12Bibliographically approved
Ávila-Zúñiga Nordfjeld, A., Dansarie, M., Liwång, H., Dalaklis, D. & Mejía Jr., M. (2023). Proposing a Mathematical Dynamic Model to Develop a National Maritime Security Assessment and Build a National Maritime Security Plan. Journal of Maritime Research, 20(3), 123-132
Open this publication in new window or tab >>Proposing a Mathematical Dynamic Model to Develop a National Maritime Security Assessment and Build a National Maritime Security Plan
Show others...
2023 (English)In: Journal of Maritime Research, ISSN 1697-4840, E-ISSN 1697-9133, Vol. 20, no 3, p. 123-132Article in journal (Refereed) Published
Abstract [en]

A proper assessment of maritime security risks at the national level is crucial to a national maritimesecurity plan (NMSP) in order to secure the concerned country’s ports, vessels and territorial sea. Thus, the importance of implementing a national maritime security assessment (NMSA) to counter securitythreats and ensure the continuity of national and international trade. The most important set of inter-national regulations concerning maritime security is the International Ship and Port Facility Security(ISPS) Code, which includes revision, approval and control of compliance of the Port Facility Security Plan (PFSP), which shall be based upon the Port Facility Security Assessment (PFSA). This paper proposes a mathematical dynamic model that calculates in real time the residual risk for the whole country and each of its ports by adapting and expanding the formula and procedures established in the Code, which since it has already been implemented around the world, gives the opportunity to take advantageof this quantitative solution to administrate maritime security risks on a nation-wide basis and create an effective national maritime security plan, which would allow the concerned authorities to improve situational awareness and adapt to security changes through a better planning of human, economic and material resources to deter security threats. The model was tested with the use of five encoded categories as countries, each of them with three ports, which encompassed three port facilities. The results indicate that this methodology is easy to implement and widespread use of that model could strength robustness in national security. 

Keywords
International Ship and Port Facility Security (ISPS) Code, National Maritime Security Plan (NMSP), National Maritime Security Assessment (NMSA), Maritime & Port Security, National Security.
National Category
Other Social Sciences
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-12092 (URN)
Available from: 2024-01-03 Created: 2024-01-03 Last updated: 2024-01-05Bibliographically approved
Dansarie, M., Derbez, P., Leander, G. & Stennes, L. (2022). Breaking HALFLOOP-24. Paper presented at Fast Software Encryption (FSE) 2023, Beijing, China, March 20-24, 2023. IACR Transactions on Symmetric Cryptology, 2022(3), 217-238
Open this publication in new window or tab >>Breaking HALFLOOP-24
2022 (English)In: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2022, no 3, p. 217-238Article in journal (Refereed) Published
Abstract [en]

HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications. We present the first public cryptanalysis of HALFLOOP-24 and show that HALFLOOP-24, despite its key size of 128 bits, is far from providing 128 bit security. More precisely, we give attacks for ciphertext-only, known-plaintext, chosen-plaintext and chosen-ciphertext scenarios. In terms of their complexities, most of them can be considered practical. However, in the real world, the amount of available data is too low for our attacks to work. Our strongest attack, a boomerang key-recovery, finds the first round key with less than 210 encryption and decryption queries. In conclusion, we strongly advise against using HALFLOOP-24.

Keywords
HF Radio, ALE, HALFLOOP, Boomerang
National Category
Other Mathematics
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-11065 (URN)10.46586/tosc.v2022.i3.217-238 (DOI)
Conference
Fast Software Encryption (FSE) 2023, Beijing, China, March 20-24, 2023
Available from: 2022-09-13 Created: 2022-09-13 Last updated: 2022-09-26Bibliographically approved
Hult, G., Almbladh, T., Dansarie, M., Granholm, J., Lagg, E., Silfverskiöld, S. & Thenander, D. (2022). Technology Forecast 2022 – Military Utility of Future Technologies. Stockholm: Försvarshögskolan (FHS)
Open this publication in new window or tab >>Technology Forecast 2022 – Military Utility of Future Technologies
Show others...
2022 (English)Report (Other academic)
Abstract [en]

For the purpose of Technology Forecast 2022 five reports from the German Fraunhofer Institute were chosen by FMV (and SwAF) and given to the Department of Systems Science for Defence and Security to analyse and assess within the timeframe up to 2040.

The following research reports were reviewed by the working group at SEDU:

·       AI Hardware 

·       Explainable Artificial Intelligence

·       Human-Agent Teaming

·       Photonic Radar

·       Satellite Independent Navigation 

The aim of the Technology Forecast seminars and the finished product, this report, is to assess the potential military utility of the reviewed technologies and how they may contribute to the Swedish Armed Forces’ operational capabilities based on the presented concept(s) and scenario(s). 

The military utility is categorised by one of four assessments: Significant, Moderate, Negligible or Uncertain. 

The following technologies were assessed to potentially have significant military utility:

·       Explainable Artificial Intelligence

·       Human-Agent Teaming

·       Photonic Radar

The following technologies were assessed to have uncertain military utility:

·       AI Hardware 

·       Satellite Independent Navigation 

Place, publisher, year, edition, pages
Stockholm: Försvarshögskolan (FHS), 2022. p. 58
Keywords
Military technology, forecast, military utility
National Category
Other Engineering and Technologies
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-11254 (URN)
Projects
Teknisk prognosTechnology forecast
Available from: 2023-01-05 Created: 2023-01-05 Last updated: 2023-01-05Bibliographically approved
Dansarie, M. (2021). Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment. IACR Transactions on Symmetric Cryptology, 2021(3), 36-53
Open this publication in new window or tab >>Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment
2021 (English)In: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2021, no 3, p. 36-53Article in journal (Refereed) Published
Abstract [en]

The SoDark cipher is used to protect transmitted frames in the second and third generation automatic link establishment (ALE) standards for high frequency (HF) radios. The cipher is primarily meant to prevent unauthorized linking and attacks on the availability of HF radio networks. This paper represents the first known security analysis of the cipher used by the second generation ALE protocol—the de facto world standard—and presents a related-tweak attack on the full eight round version of the algorithm. Under certain conditions, collisions of intermediate states several rounds into the cipher can be detected from the ciphertext with high probability. This enables testing against the intermediate states using only parts of the key. The best attack is a chosen-ciphertext attack which can recover the secret key in about an hour with 100% probability, using 29 chosen ciphertexts.

Keywords
automatic link establishment, ALE, SoDark, cryptanalysis, block cipher
National Category
Other Mathematics
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-10325 (URN)10.46586/tosc.v2021.i3.36-53 (DOI)000700710300002 ()
Available from: 2021-09-20 Created: 2021-09-20 Last updated: 2022-05-11Bibliographically approved
Dansarie, M. (2021). sboxgates: A program for finding low gate count implementations of S-boxes. Journal of Open Source Software, 6(62), 1-3, Article ID 2946.
Open this publication in new window or tab >>sboxgates: A program for finding low gate count implementations of S-boxes
2021 (English)In: Journal of Open Source Software, E-ISSN 2475-9066, Vol. 6, no 62, p. 1-3, article id 2946Article in journal (Refereed) Published
Abstract [en]

S-boxes are often the only nonlinear components in modern block ciphers. They are commonly selected to comply with very specific criteria in order to make a cipher secure against, for example, linear and differential attacks. An M x N S-box can be thought of as a lookup table that relates an M-bit input value to an N-bit output value, or as a set of N boolean functions of M variables (Schneier, 1996).

Although cipher specifications generally describe S-boxes using their lookup tables, they can also be described as boolean functions or logic gate circuits. sboxgates, which is presented here, finds equivalent logic gate circuits for S-boxes, given their lookup table specification. Generated circuits are output in a human-readable XML format. The software can convert the output files into C or CUDA (a parallel computing platform for Nvidia GPUs) source code. The generated circuits can also be converted to the DOT graph description language for visualization with Graphviz (Ellson et al., 2002).

National Category
Computational Mathematics
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-10004 (URN)10.21105/joss.02946 (DOI)
Available from: 2021-06-16 Created: 2021-06-16 Last updated: 2022-09-15Bibliographically approved
Hult, G., Almbladh, T., Andersson, K., Bull, P., Dansarie, M., Granholm, J. & Lagg, E. (2021). Technology Forecast 2021 – Military Utility of Future Technologies. Stockholm: Försvarshögskolan (FHS)
Open this publication in new window or tab >>Technology Forecast 2021 – Military Utility of Future Technologies
Show others...
2021 (English)Report (Other academic)
Abstract [en]

For the purpose of Technology Forecast 2021 five reports from the German Fraunhofer Institute were chosen by FMV (and SwAF) and given to Systems Science for Defence and Security Division to analyse and assess within the timeframe up to 2040.

The following research reports were reviewed by the working group at SEDU:

·       Adversarial Machine Learning 

·       High Entropy Ceramics

·       Large Unmanned Underwater Vehicles

·       Living Sensors

·       Machine Learning in Materials Development

The aim of the Technology Forecast seminars and the finished product, this report, is to assess the potential military utility of the reviewed technologies and how they may contribute to the Swedish Armed Forces’ operational capabilities based on the presented concept(s) and scenario(s). 

The military utility is categorised by one of four assessments: Significant, Moderate, Negligible or Uncertain.

The following technologies were assessed to potentially have significant military utility:

·       High Entropy Ceramics

·       Machine Learning in Materials Development

·       Adversarial Machine Learning

The following technology was assessed to potentially have moderate military utility:

·       Large Unmanned Underwater Vehicles 

The following technology was assessed to have uncertain military utility:

·       Living Sensors

Place, publisher, year, edition, pages
Stockholm: Försvarshögskolan (FHS), 2021. p. 45
Keywords
Military technology, forecast, military utility
National Category
Other Engineering and Technologies
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-10616 (URN)
Projects
Teknisk prognosTechnology forecast
Available from: 2022-01-14 Created: 2022-01-14 Last updated: 2022-01-17Bibliographically approved
Robinson, Y., García Lozano, M., Appelgren, J., Benshof, J., Börjesson, H., Clausen Mork, J., . . . Wadströmer, N. (2020). AI och framtidens försvarsmedicin. Stockholm: Totalförsvarets forskningsinstitut
Open this publication in new window or tab >>AI och framtidens försvarsmedicin
Show others...
2020 (Swedish)Report (Other academic)
Alternative title[en]
AI and the future defence medicine
Abstract [sv]

Medicinskt legitimerad personal är, och kommer med stor sannolikhet fortsattatt vara, en knapp resurs inom Försvarsmaktens sjukvårdsorganisation. I denna rapport ges en översikt över pågående och planerade ansatser baserade påartificiell intelligens (AI) inom akutsjukvård med särskild tonvikt på omhändertagandet av traumapatienter, där lösningarna skulle kunna bidra till att Försvarsmakten kan bibehålla sin sjukvårdskapacitet i kritiska lägen. Rapporten är ett resultat av samarbetet mellan FM, FOI, FMV, FHS och KI, och vänder sig i första hand till Försvarsmaktens strategiska ledning.

Användningen av AI-teknik i framtida beslutsstöd kan skapa nya möjligheter till avlastning av personal och resurseffektivisering. Tekniken ger möjligheter att i realtid samla in, bearbeta och analysera stora mängder blandadinformation om förbands hälsoläge och fysiska stridsvärde. Bedömning av skadade kan t.ex. göras av triagedrönare och den efterföljande evakueringen kanunderlättas av intelligenta autonoma plattformar. Införandet av AI-system ställer dock vårdgivaren inför svåra etiska och medikolegala överväganden.

Försvarsmedicin har en central roll i Försvarsmaktens krigföringsförmåga och för samhällets uthållighet. För att nyttja hela AI-teknikens framfart till Försvarsmaktens nytta måste dess innebörd och konsekvens för försvarsmedicinen förstås. Därför rekommenderar denna studie att Försvarsmaktens framtida satsningar inom AI och autonomi inkluderar den försvarsmedicinska teknikutveckling som är beskriven i denna rapport.

Abstract [en]

Medical staff is, and will most likely remain, a scarce resource in the Swedish Armed Forces’ (SAF) medical support organization. This report reviews on-going and emerging developments using artificial intelligence (AI) for medical care, focusing on prehospital trauma care, enhancing the SAF’s combat casualty care capability. This report results from the collaboration between SAF, FOI, FMV, FHS, and KI, and is primarily aimed at the SAF’s strategic management.

The use of AI-technology in future decision support can create new opportunities for staff relief and resource efficiency. The technology provides opportunities to collect, process, and analyze large amounts of mixed information about the unit’s health status and physical combat value in realtime. Assessment of injured people can, e.g., be done by triage drones, and intelligent autonomous platforms can facilitate the subsequent evacuation. However, the introduction of AI-systems presents difficult ethical and medical law considerations.

Defense medicine has a central role in the Armed Forces’ warfare capability and society’s endurance. Using AI-technology to benefit the SAF, its meaning and consequence for defense medicine must be understood. Therefore, this study recommends that the Armed Forces’ future investments in AI and autonomy include the defense medical technology development described in this report.

Place, publisher, year, edition, pages
Stockholm: Totalförsvarets forskningsinstitut, 2020. p. 157
Series
FOI-R, ISSN 1650-1942 ; 5045
Keywords
AI, health care, combat casualty care, defence medicine, autonomous systems, deep learning, decision support, triage, AI, hälso- och sjukvård, krigssjukvård, försvarsmedicin, autonoma system, djupinlärning, beslutsstöd, triage
National Category
Other Social Sciences not elsewhere specified
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-9615 (URN)
Funder
Swedish Armed Forces, E60560
Available from: 2021-01-21 Created: 2021-01-21 Last updated: 2021-11-09Bibliographically approved
Fox Franke, D., Sibold, D., Teichel, K., Dansarie, M. & Sundblad, R. (2020). Network Time Security for the Network Time Protocol.
Open this publication in new window or tab >>Network Time Security for the Network Time Protocol
Show others...
2020 (English)Report (Refereed)
Abstract [en]

This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).

NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.

Publisher
p. 33
Series
Request for comments, ISSN 2070-1721 ; 8915
National Category
Computer Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-9448 (URN)10.17487/RFC8915 (DOI)
Available from: 2020-10-01 Created: 2020-10-01 Last updated: 2021-11-11Bibliographically approved
Dansarie, M. (2020). Teknisk utveckling och hybridkrigföring. Kungl Krigsvetenskapsakademiens Handlingar och Tidskrift (1), 162-165
Open this publication in new window or tab >>Teknisk utveckling och hybridkrigföring
2020 (Swedish)In: Kungl Krigsvetenskapsakademiens Handlingar och Tidskrift, ISSN 0023-5369, no 1, p. 162-165Article in journal (Other academic) Published
National Category
Other Engineering and Technologies
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-9110 (URN)
Available from: 2020-04-07 Created: 2020-04-07 Last updated: 2020-10-19Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9246-0263

Search in DiVA

Show all publications