Air transport is one of the keys to the economic development and stability of a country. The emergence of this sector in a State depends on the radio resources implemented to ensure the safe and rapid flow of air traffic, but above all to guarantee the safety and efficiency of air navigation. It is with this in mind that the International Civil Aviation Organization «ICAO» recommends that all State bodies responsible for providing air services within the airspace of Contracting States meet the requirements of the Management of the Air Space «ATM» and the Communication, Navigation and Surveillance system in a structured approach to the effective implementation of the system called CNS/ATM. It is in this context that we subscribe to our study which aims to contribute to the process of implementation of the CNS/ATM plan by the Régie des Voies Aériennes in the airspace of the Democratic Republic of Congo. It emerges from this ICAO recommendation that our country continues to show some shortcomings, particularly in the area of full surveillance of its airspace. Thus, we are working on experimenting with radar systems for full, reliable and optimal surveillance of the country’s airspace. We have associated the current ADS-B surveillance system with other surveillance systems, primary radar «PSR» and secondary radar «SSR» to cover all regions of the airspace, and thanks to the multi-sensor function of the TOPSKY airspace surveillance, security and visualization system all surveillance data from these different systems will be merged.
In this article, we describe a hybrid architecture integrating firewalls, filtering routers, encryption algorithms and the proxy server as well as intrusion detection programs in an interface environment between Internet and Intranet. It is well known that the Cyber Security policy strategy has many advantages currently when it often intervenes in this environment chosen as a field of investigation for the identification of users who are not yet recognized to define a general policy of effective and efficient control. Indeed, the current approaches are based on a cyber security policy focused on a password not on which unfortunately is easily crackable using specialized programs used by hackers or pirates. However, our architecture is not based on architectures and therefore does not suffer from this limitation. On the other hand, it provides several levels of security thanks to the integration policy recommended respectively of filtering routers, proxy server and advanced encryption algorithms ensuring the security at several levels. Thus, this initiative taken, proves that our architecture makes it possible to compensate for the deficiencies of the previous in this article notably INTERNET and INTRANET.