The repository is currently being upgraded to DSpace 7. Temporarily, only admins can login. Submission of items and changes to existing items is prohibited until the completion of this upgrade process.
Airplane data networks and security issues
Ali, Muhammad Sabeeh
MetadataShow full item record
Ali, M.S.; Bhagavathula, R.; Pendse, R.; , "Airplane data networks and security issues," Digital Avionics Systems Conference, 2004. DASC 04. The 23rd , vol.2, no., pp. 8.E.1- 81-12 Vol.2, 24-28 Oct. 2004 doi: 10.1109/DASC.2004.1390773
The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become an essential component of a mobile workforce and multiple mechanisms are being devised to ensure seamless connectivity to corporate resources. An integrated security framework requires a careful consideration of the security features of the network within an airplane. The passenger network (PN) is used by passengers within the airplane to access network resources on the global Internet. The crew network (CrN), on the other hand, is meant for the crew of the airplane to access resources not only on the global Internet, but also to access resources within the airplane's home network. The control network (CoN) is a strictly regulated network wherein the various components of an airplane interact with each other. As such, only authorized personnel are allowed access to the CoN. In order to facilitate an efficient monitoring of network activity within the PN, the CrN and the CoN, the authors present an in-house network monitoring tool tuned towards the case of a networked airplane that provides real-time warning of impending network threats to allow the network administrators to carry out appropriate responses to intrusions. The network monitoring agents would be located within the individual networks (PN, CrN and CoN) to monitor individual networks. In addition, another sensor would be located within the aircraft access network to ascertain if malicious traffic is introduced into the CrN and/or the CoN.
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954