Show simple item record

dc.contributor.authorAli, Muhammad Sabeeh
dc.contributor.authorBhagavathula, Ravi
dc.contributor.authorPendse, Ravi
dc.date.accessioned2011-09-19T20:36:39Z
dc.date.available2011-09-19T20:36:39Z
dc.date.issued2004-10-04
dc.identifier.citationAli, M.S.; Bhagavathula, R.; Pendse, R.; , "Airplane data networks and security issues," Digital Avionics Systems Conference, 2004. DASC 04. The 23rd , vol.2, no., pp. 8.E.1- 81-12 Vol.2, 24-28 Oct. 2004 doi: 10.1109/DASC.2004.1390773en_US
dc.identifier.isbn078038539X
dc.identifier.urihttp://hdl.handle.net/10057/3784
dc.identifier.urihttp://dx.doi.org/10.1109/DASC.2004.1390773
dc.descriptionThe full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954en_US
dc.description.abstractThe information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become an essential component of a mobile workforce and multiple mechanisms are being devised to ensure seamless connectivity to corporate resources. An integrated security framework requires a careful consideration of the security features of the network within an airplane. The passenger network (PN) is used by passengers within the airplane to access network resources on the global Internet. The crew network (CrN), on the other hand, is meant for the crew of the airplane to access resources not only on the global Internet, but also to access resources within the airplane's home network. The control network (CoN) is a strictly regulated network wherein the various components of an airplane interact with each other. As such, only authorized personnel are allowed access to the CoN. In order to facilitate an efficient monitoring of network activity within the PN, the CrN and the CoN, the authors present an in-house network monitoring tool tuned towards the case of a networked airplane that provides real-time warning of impending network threats to allow the network administrators to carry out appropriate responses to intrusions. The network monitoring agents would be located within the individual networks (PN, CrN and CoN) to monitor individual networks. In addition, another sensor would be located within the aircraft access network to ascertain if malicious traffic is introduced into the CrN and/or the CoN.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.ispartofseriesDigital Avionics Systems Conference, 2004. DASC 04. The 23rd;vol.2, no., pp. 8.E.1- 81-12
dc.subjectData securityen_US
dc.subjectExplosivesen_US
dc.subjectHome automationen_US
dc.subjectInformation securityen_US
dc.subjectInformation technologyen_US
dc.subjectMonitoringen_US
dc.subjectPersonnelen_US
dc.titleAirplane data networks and security issuesen_US
dc.typeConference paperen_US
dc.description.versionPeer reviewed article
dc.rights.holder© IEEE, 2004


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record