[EAS] Next Generation

Harold Price hprice at sagealertingsystems.com
Thu Nov 13 17:11:14 CST 2014


While you are designing ...

Here are some items you should consider:

Preventing long delay replay problems (Bobby Bones)- just add a year 
to the protocol, define a start and end validity window in the spec, 
and problem solved.

Preventing intentional hacks - any code word or hash that is 
distributed on a public system, or via FSK (also public) is not 
giving you any real protection, as anyone can easily learn the code 
word of the day/week/month.

Requiring Internet access - Remember, FSK relayed EAN is used before 
national emergency, during the emergency, and after the 
emergency.  Maybe days after.  And on those days, the Internet may be 
down.  Any pre-delivered key system with a short timeout runs the 
risk of not being able to use the system when you need it.  Any 
system that requires real time access to the Internet to validate a 
pending message is likewise not going to work on the day.

Any type of public/private key signing or encryption scheme needs to 
have a significant number of bits in the key - you can't be secure 
with a 4 byte key - especially if your protection algorithm is 
published in the federal register.

Any system requiring a person in the loop at the radio/tv/cable end 
to play out an EAN is not viable.  Remember, the reason we have EAS 
vs. EBS is so that stations can run automated and unattended.

Any system requiring the EAN to be received via two different paths 
is making the delivery problem much harder.

You can't modify the legacy EAN as it relays through the system and 
still be able to detect duplicates - and you want to detect duplicates.

These problems aren't unsolvable, but take them into account as you 
propose new systems.

Harold



More information about the EAS mailing list