Corpus ID: 175062


  author={R. Robinson and K. Sampigethaya and Mingyan Li and S. Lintelman and R. Poovendran and David von Oheimb},
The next-generation commercial airplane models have networking facilities that enable onboard systems to communicate between themselves as well as with offboard systems. This new feature allows network applications to realize many benefits for airplane manufacturing, operations and maintenance processes. However, at the same time vulnerabilities are introduced that can threaten the onboard systems. Regulatory bodies such as the EASA and FAA recognize that the unprecedented network-enabled… Expand

Figures and Tables from this paper

An efficient, secure and trusted channel protocol for avionics wireless networks
A secure and trusted channel protocol that satisfies the stated security and operational requirements for an AWN protocol and is efficient for both the initial start-up of the network and when resuming a session after a cold and/or warm restart of a node. Expand
Protecting flight critical systems against security threats in commercial air transportation
Today's commercial aircraft are e-Enabled, with networked connectivity to ground stations for real-time health monitoring, location tracking, and maintenance. Once the systems are connected to theExpand
Challenges of security and trust in Avionics Wireless Networks
Avionics networks have a set of stringent reliability and safety requirements. In existing deployments, most of these networks are based on wired technology which provides a high degree ofExpand
Addressing Security Challenges in Emerging Data-based Aeronautical Communications
This research work deals with the information and network security in the aeronautical communication domain. Three fundamental research axes are explored. First, a quantitative network security riskExpand
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
Three approaches to establish a secure channel based on pre-shared keys, trusted key distribution, and key-sharing protocols are proposed and evaluated based on security and operational requirements for an Avionics Wireless Network (AWN). Expand
An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature
A new type of online/offline identity-based signature scheme is introduced that will resolve the PKI management issues and achieve high level of efficiency that makes possible for e-enabled aircrafts to perform frequent signing generations. Expand
Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey
A multi-layered security framework is proposed in future research work, which includes detecting and preventing different attacks in the ADS-B system, which is vulnerable to deliberate intrusions and attacks. Expand
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System
An efficient TLHIBS scheme with batch verification for the ADS-B system that does not require hash-to-point operation or (expensive) certification management is constructed and is proved secure in the random oracle model. Expand
An ADS-B Message Authentication Method Based on Certificateless Short Signature
This paper studies the integrity and authenticity of information by signing messages and proposes an ADS-B message authentication method based on certificateless short signature, which does not require certificate management and has efficient performance. Expand
Efficient Pairing-Free Identity-Based ADS-B Authentication Scheme With Batch Verification
A new, efficient, and secure pairing-free ADS-B authentication scheme with Batch Verification in ID-based framework is proposed that is proven secure and is more efficient than the existing schemes. Expand


Security Assurance for IT Infrastructure Supporting Airplane Production, Maintenance, and Operation
∗ Corresponding author: Scott A. Lintelman; Email:, Tel: 425-373-2611; Mailing address: 7L-49, 2760, 160 Ave SE, Bellevue, WA 98008 Abstract The present paper seeks toExpand
Understanding PKI: Concepts, Standards, and Deployment Considerations
Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery. Expand
WiMax/802.16 threat analysis
This paper examines threats to the security of the WiMax/ 802.16 broadband wireless access technology and evaluates the likelihood, impact and risk according to the threat assessment methodology proposed by the ETSI. Expand
The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers
The results show that announcing an Internet security breach is negatively associated with the market value of the announcing firm, and the cost of poor security is very high for investors. Expand
Wireless sensor network for aircraft health monitoring
This article describes the architecture of the wireless sensor network for monitoring of the health of aircraft engines along with how it fits into the general area of wireless sensor networks. Expand
Networked Local Area Networks (LANs) in Aircraft: Safety, Security and Certification Issues, and Initial Acceptance Criteria (Phases 1 and 2)
  • Final Report, December 2006.
  • 2006
Smith , and Nick Multari , “ Networked Local Area Networks ( LANs ) in Aircraft : Safety , Security and Certification Issues , and Initial Acceptance Criteria ( Phases 1 and 2 )
  • 2006
Use of integrated vehicle health management in the field of commercial aviation
  • NASA ISHEM Forum, 2005.
  • 2005
Security Specification for Distribution and Storage of Airplane-Loadable Software and Airplane-Generated Data
  • Common Criteria Protection Profile manuscript, available upon request.