• Corpus ID: 175062


  author={Richard Robinson and Krishna Sampigethaya and Mingyan Li and Scott Lintelman and Radha Poovendran and David von Oheimb},
The next-generation commercial airplane models have networking facilities that enable onboard systems to communicate between themselves as well as with offboard systems. This new feature allows network applications to realize many benefits for airplane manufacturing, operations and maintenance processes. However, at the same time vulnerabilities are introduced that can threaten the onboard systems. Regulatory bodies such as the EASA and FAA recognize that the unprecedented network-enabled… 

Figures and Tables from this paper

An efficient, secure and trusted channel protocol for avionics wireless networks

A secure and trusted channel protocol that satisfies the stated security and operational requirements for an AWN protocol and is efficient for both the initial start-up of the network and when resuming a session after a cold and/or warm restart of a node.

Protecting flight critical systems against security threats in commercial air transportation

This paper presents a security framework and the methodologies necessary to implement these security measures using flash-based secure FPGAs as hardware root-of-trust using DO-254 compliant systems and industry standard cryptographic algorithms and protocols.

Challenges of security and trust in Avionics Wireless Networks

The paper makes suggestions that set the agenda for security, reliability and trust work that could provide an AWN system meeting the required safety standards, along with highlighting potential directions for solutions.

Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

Three approaches to establish a secure channel based on pre-shared keys, trusted key distribution, and key-sharing protocols are proposed and evaluated based on security and operational requirements for an Avionics Wireless Network (AWN).

An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature

A new type of online/offline identity-based signature scheme is introduced that will resolve the PKI management issues and achieve high level of efficiency that makes possible for e-enabled aircrafts to perform frequent signing generations.

Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey

A multi-layered security framework is proposed in future research work, which includes detecting and preventing different attacks in the ADS-B system, which is vulnerable to deliberate intrusions and attacks.

Efficient anonymous authentication scheme for automatic dependent surveillance-broadcast system with batch verification

The proposed anonymous authentication scheme for ADS-B system with batch verification based on Message Recovery Signature (MRS) provides essential security features with less computational and communication overhead comparison with the other existing schemes.

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System

An efficient TLHIBS scheme with batch verification for the ADS-B system that does not require hash-to-point operation or (expensive) certification management is constructed and is proved secure in the random oracle model.

An ADS-B Message Authentication Method Based on Certificateless Short Signature

This paper studies the integrity and authenticity of information by signing messages and proposes an ADS-B message authentication method based on certificateless short signature, which does not require certificate management and has efficient performance.

Efficient Pairing-Free Identity-Based ADS-B Authentication Scheme With Batch Verification

A new, efficient, and secure pairing-free ADS-B authentication scheme with Batch Verification in ID-based framework is proposed that is proven secure and is more efficient than the existing schemes.



Understanding PKI: Concepts, Standards, and Deployment Considerations

Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.

WiMax/802.16 threat analysis

This paper examines threats to the security of the WiMax/ 802.16 broadband wireless access technology and evaluates the likelihood, impact and risk according to the threat assessment methodology proposed by the ETSI.

The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers

The results show that announcing an Internet security breach is negatively associated with the market value of the announcing firm, and the cost of poor security is very high for investors.

Wireless sensor network for aircraft health monitoring

This article describes the architecture of the wireless sensor network for monitoring of the health of aircraft engines along with how it fits into the general area of wireless sensor networks.

Security Assurance for IT Infrastructure Supporting Airplane Production, Maintenance, and Operation

The present paper seeks to motivate interest in a Boeing-led workshop session on the security evaluation of IT infrastructure supporting aircraft, with focus on issues that arise when flight-critical software and related data are distributed among suppliers, manufacturers, airlines, and maintenance organizations via open information networks.

Smith , and Nick Multari , “ Networked Local Area Networks ( LANs ) in Aircraft : Safety , Security and Certification Issues , and Initial Acceptance Criteria ( Phases 1 and 2 )

  • 2006

Use of integrated vehicle health management in the field of commercial aviation

  • NASA ISHEM Forum, 2005.
  • 2005

Networked Local Area Networks (LANs) in Aircraft: Safety, Security and Certification Issues, and Initial Acceptance Criteria (Phases 1 and 2)

  • Final Report, December 2006.
  • 2006

Security Specification for Distribution and Storage of Airplane-Loadable Software and Airplane-Generated Data

  • Common Criteria Protection Profile manuscript, available upon request.