7th AIAA ATIO Conf, 2nd CEIAT Int'l Conf on Innov and Integr in Aero Sciences,17th LTA Systems Tech Conf; Followed by 2nd TEOS 2007
DOI: 10.2514/6.2007-7769
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Public Key Enabled Applications on the Operation and Maintenance of Commercial Airplanes

Abstract: Making airplanes network-enabled can significantly increase the efficiency of aircraft manufacturing, operation and maintenance processes. Yet these benefits cannot be realized without addressing the potential for network-induced security threats. This paper addresses challenges that emerge for network-enabled airplanes that use public key cryptography-based applications. In particular, we focus on the electronic distribution of airplane software and data. We present both an ad hoc approach, without trust chai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 1 publication
(3 reference statements)
0
22
0
1
Order By: Relevance
“…Electronic Distribution of Software (EDS) [17], [10], [18]: Distribution of software for airplane systems has been via physical distribution of storage media (e.g., floppy/compact discs) and signed documents over bonded carriers. However, compared to this legacy FAA-approved process, the electronic distribution of software has advantages such as reduction of system weight from onboard storage media.…”
Section: B E-enabled Airplane Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Electronic Distribution of Software (EDS) [17], [10], [18]: Distribution of software for airplane systems has been via physical distribution of storage media (e.g., floppy/compact discs) and signed documents over bonded carriers. However, compared to this legacy FAA-approved process, the electronic distribution of software has advantages such as reduction of system weight from onboard storage media.…”
Section: B E-enabled Airplane Applicationsmentioning
confidence: 99%
“…Further, in [7], [21], secure integration of wireless sensors and RFID in AHM is studied. Furthermore, in [18] potential impact of security solutions on onboard information systems is discussed.…”
Section: E-enabled Airplane Security Standards and Researchmentioning
confidence: 99%
“…Asymmetric cryptography solutions usually require a Public Key Infrastructure (PKI), i.e., a mechanism for managing identities with associated keys and certificates. 19 However, for a large complex system such as the ATC system, PKI gives rise to challenges such as enabling interoperability between multiple CAs and developing a standard certificate policy for multiple scenarios encountered by the airplane.…”
Section: B Addressing the Impact Of Cryptographic Solutionsmentioning
confidence: 99%
“…7,14,15 Further, the anticipated impact of the use of security solutions on the commercial aviation information systems and processes are being identified. 19 An abundance of literature also addresses the airborne point-to-point networking issues, such as transmission protocol design and the impact of air traffic density on the network topology, 22,23 as well as the design of safety-critical ATC operations such as conflict detection and resolution in Free Flight. 21 However, only a few have just begun to address security and reliability of future ATC based on broadcast data links, for mitigating threats to data integrity and authenticity in ADS-B based navigation and surveillance.…”
Section: A Ongoing Research For Securing the E-enabled Aircraftmentioning
confidence: 99%
“…4 Operational constraints may also preclude dynamic path discovery by relying parties: access to the Internet may be unavailable due to lack of coverage (e.g., for traveling users) or because of restrictive security policies (e.g., at secure facilities). Sometimes network access must be carefully structured and "rationed" to reduce the attack surface of a system: for example, an airplane-based relying party may not want to download intermediate CA certificates in real time since it may expose potential security vulnerabilities more frequently [28].…”
Section: End-entity Certificate Discoverymentioning
confidence: 99%