Airplane data networks and security issues

No Thumbnail Available
Authors
Ali, Muhammad Sabeeh
Bhagavathula, Ravi
Pendse, Ravi
Advisors
Issue Date
2004-10-04
Type
Conference paper
Keywords
Data security , Explosives , Home automation , Information security , Information technology , Monitoring , Personnel
Research Projects
Organizational Units
Journal Issue
Citation
Ali, M.S.; Bhagavathula, R.; Pendse, R.; , "Airplane data networks and security issues," Digital Avionics Systems Conference, 2004. DASC 04. The 23rd , vol.2, no., pp. 8.E.1- 81-12 Vol.2, 24-28 Oct. 2004 doi: 10.1109/DASC.2004.1390773
Abstract

The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become an essential component of a mobile workforce and multiple mechanisms are being devised to ensure seamless connectivity to corporate resources. An integrated security framework requires a careful consideration of the security features of the network within an airplane. The passenger network (PN) is used by passengers within the airplane to access network resources on the global Internet. The crew network (CrN), on the other hand, is meant for the crew of the airplane to access resources not only on the global Internet, but also to access resources within the airplane's home network. The control network (CoN) is a strictly regulated network wherein the various components of an airplane interact with each other. As such, only authorized personnel are allowed access to the CoN. In order to facilitate an efficient monitoring of network activity within the PN, the CrN and the CoN, the authors present an in-house network monitoring tool tuned towards the case of a networked airplane that provides real-time warning of impending network threats to allow the network administrators to carry out appropriate responses to intrusions. The network monitoring agents would be located within the individual networks (PN, CrN and CoN) to monitor individual networks. In addition, another sensor would be located within the aircraft access network to ascertain if malicious traffic is introduced into the CrN and/or the CoN.

Table of Contents
Description
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
Publisher
IEEE
Journal
Book Title
Series
Digital Avionics Systems Conference, 2004. DASC 04. The 23rd;vol.2, no., pp. 8.E.1- 81-12
PubMed ID
DOI
ISSN
EISSN