Research Paper on "Advanced Avionics in General Aviation the Issues Advantages and Disadvantages"

Research Paper 10 pages (2859 words) Sources: 20

[EXCERPT] . . . .

network vulnerabilities that avionics are exposed to as well as propose improved designs that can help in securing the avionics from unauthorized access. The main solution is the use of an integrated security gateway coupled with an appropriate air gap to isolate the passenger-centric network from the plane's critical avionics infrastructure.

The recent revelations that hackers and cyber terrorists can easily gain access into the avionics of commercial and military aircrafts has made it necessary for aircraft avionics designers to rethink on better ways of securing the avionics networks to secure then from these unwarranted attacks that may compromise data confidentiality, integrity and availability . Perfect examples include the hack attack on U.S. Drones by Iraqi insurgent who managed to intercept live video feeds from the pilotless spy planes (Heussner and Martinez,2009) as well as the discovery of a vulnerability on 787 Dreamliner's avionics that could allow a hacker to gain access to plane's computer system and then commandeer the plane (Harwood,2008). As noted by FAA (2008) the proposed architecture of the Boeing 787 Dreamliner allowed a new kind of connectivity for the passengers different from the previously isolated data networks. The new passenger connectivity was noted to be capable of creating security vulnerabilities that could emanate from the intentional corruption of data as well as systems that are critical to the plane's safety. In this paper, we explore the forms of network vulnerabilities that avionics are exposed to as well as propose improved designs that can help in securing the avionics from unauthorized access. The main solution is the use of an integrated security gateway
Continue scrolling to

download full paper
coupled with an appropriate air gap to isolate the passenger-centric network from the plane's critical avionics infrastructure.

Aims

The aim of this paper is to explore the forms of network vulnerabilities that avionics are exposed to as well as propose improved designs that can help in securing the avionics from unauthorized access.

Methodology

The methodology used in this paper is a critical review of extant literature in order to identify the knowledge gap that exists as pertain the network infrastructure as well as avionic network securing technologies. The identified gaps are then used in the formulation of suitable solutions for solving the possible points of vulnerability.

Data sources

The information to be used in this paper is to be extracted from various online libraries such as IEEE, ACM Digital library and FAA. Online Newspapers, Magazines and other technical blogs are also used in the completion of this work.

Integrated security gateway

A review of literature has indicated that while the reliance on Internet Protocol (IP)-based networks in the aviation industry has allowed for the launching of several cutting-edge technologies, application and unparalleled benefits, It is very open to several security risks as well as network attacks (Mostafa, El Kalam and Fraboul, 2010,p.1). Several security mechanisms as well as solutions have been continuously developed in an attempt to mitigate the ever rising number of incidents of network attacks. Some of the solutions have been effective in solving some of the problems but some security holes have persisted. The process of securing and open and yet extremely complex systems such as airplane avionics has become a daunting task for the security engineers. This is in fact worsened by the false sense of security which is propagated by the over dependence on the conventional security mechanisms that provide s a false sense of security and hence providing n opening for hackers and attackers.

In order to ensure that the networks are secured, it is important for all of the existing mechanisms to operate together in harmony. This harmonic multilayered operation which was suggested by Mostafa, El Kalam and Fraboul (2010) can be coupled with air gap techniques to build a ubiquitous, secured and scalable avionic system capable of detecting intrusion, deterring intrusion and well as operating seamlessly while providing the pilots and passengers safety and convenience thorough he flight period. The proposed solution partly involves the implementation of an architecture that takes into account the Quality of Service (QoS) requirements. The solution is therefore a security gateway that is QoS capable as well as an air gap for data traffic isolation.

The most probable points of attack

A review of literature indicates that several services on the plane avionics are susceptible to hacker and cyber terrorist attacks. The current commercial airline carrier data networks are based on IP systems (Thantry, Ali and Pendse,2006). This has enabled passengers to easily access the internet as well as enjoy other benefits. The e-enabled networks has made it possible for certain ground breaking applications such as Electronic Flight Bag (EFB), video surveillance, In-Flight Entertainment (IFE) and VoIP to become part and parcel of the contemporary aircraft avionics experience. However, the adoption of TCP/IP/UDP, TFTP as well as SNMP protocols into the aircraft network has exposed this sensitive system to a totally new forms of attacks (Reinhart et al.,2004). Several security mechanisms as well as solutions have been presented in order to help in taking care of the growing lists of attacks against the aircraft avionic systems. Even though the conventional approaches have managed to mitigate some of the security problems, they have also been noted to leave some gaping security holes (Zuccato,2004).

Most of the security holes fail to be noticed and even sealed when the existing solutions are combined ineffectively. Other than that, the overdependence on traditional security mechanisms like firewalls are ineffective in the provision of properly secured network. What makes the situation worse is the fact that hackers have come up with sophisticated methods of attack that can easily compromise the traditional security systems and mechanisms. In light of this facts, this paper proposes an integrated security architecture that used an integrated security gateway as well as air gap technologies in ensuring that the avionics communication system is not compromised. The proposed solution should be able to ensure that the performance requirements are met as well as the availability of the systems being at par for the critical traffic to be maintained at the required levels.

Findings

The security mechanisms

Fire walls

Firewalls are special network devices that are used in filtering of network traffic. They are used for filtering traffic at either one or more of the7 network layers that are certified by ISO. The most common layers where they work include the network layer, transport layer as well as the application layer (Ingham and Forrest,2002).

Ideally, there are 4 basic firewall types. These are;

Packet filtering firewalls (PFs), application proxies firewalls (APFs), circuit proxy firewalls (CPFs) and Stateful packet filtering firewalls (SPFs).

Packet filtering firewalls

The packet filtering firewalls form the very first generation of firewalls. They work in a similar way as screening routers (Zwicky, Cooper and Chapman,2000).

It works by controlling the data flowing in and out of a given network by the analysis of specific fields that are part of the packet header.

The field that they analyze includes;

IP address of the source, Port number of the source, Port number of the Destination as well as IP address of the Destination

Advantages

The PF firewall works by inspecting all of the incoming as well as outgoing packets of data and the then applying a specified policy for dropping, rejecting or accepting the data packets.

The PF firewalls was for a long time considered to be fast, efficient as well as cost effective since it is a single router that effectively protects the entire network

The PF router does however suffer from Disadvantages

The PF firewall is noted to suffer from several limitations

The device is based on the IP address system and has no form of authentication. The lack of authentication makes the system lack the ability to defend the network against man-in-the-middle attacks as well as forged packets emanating from spoofed IP addresses. The system depends on port numbers for the identification of the communicating devices. This is considered to be an unreliable indicator since the existing protocols like the network file system (NFS) employs varying port numbers.

The most important disadvantages of this system that is worth noting are the difficulty that it faces in the writing of the correct and appropriate filters (Al-shaer, Hamed, Boutaba and Hasan,2005) for the rather complex as well as rapidly evolving information systems.

The filter rules are noted to be inefficient in the provision of perfect data security against vulnerabilities in the PF.

Stateful Inspection Packet Filtering Firewall (SPF):

The PF firewall works by the statistical analysis of the incoming and outgoing data packets against a set of policies. The SPF on the other hand works by the inspection of packet headers as well as by correlating them (incoming traffic).

What SPF does is to build a dynamic session table that is used for recording the relevant information to be used for each communication in order to trace each packet going through the connection.

Diasadvantages

The SPF opens and closes the ports dynamically in accordance to the demands and needs of the… READ MORE

Quoted Instructions for "Advanced Avionics in General Aviation the Issues Advantages and Disadvantages" Assignment:

Structure of the Research Report:

The report should include:

Abstract

A one page summary of the entire report

Introduction

This should include a detailed literature review, and provide motivation for the study described.

Aims

The aims of the research should be listed here.

Methodology

This section should describe the methodology used in sufficient detail that the study could (in principle) be replicated.

Main Body of Report

This might comprise of several sections describing the detailed research activities undertaken in a logical manner, and the results thereof.

Conclusions

A summary of the main conclusions reached, their relationship to the original aims, and their significance.

References

A complete list of all cited references in alphabetical order, done in standard form.

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------

Contents, Layout and Format of a Typical Report

Abstract

A well-prepared abstract enables examiners to identify the objective of the report. The abstract should be not more than 250 words in length (1 page) and be limited to only one (1) paragraph.

Table of Contents

Include chapters (or sections) and sub-headings only. The table of contents should refer to the body of text and appendices, not to the introductory pages.

List of Tables

Tables should be numbered, bear an explanatory legend and be referred to within the text.

List of Figures

Figures and illustrations should be numbered, bear an explanatory legend and be referred to within the text. Where possible graphs and photographs should be displayed and labelled on the same page. If space does not permit you to follow this procedure, type on a separate page and insert the page facing the graph or photograph. Large maps etc. may be folded.

List of Special Names or Abbreviations

Only include if appropriate.

Main Body of Text

Begin each chapter on a new page. The text generally begins two lines below the chapter title.

Reference List

Should follow directly after main body and be titled References. References need to be presented as per American Psychological Association (APA). See http://www.apastyle.org/ for latest publication manual.

Appendix

Appendices are optional. They may be placed in another volume if the source material is confidential.

How to Reference "Advanced Avionics in General Aviation the Issues Advantages and Disadvantages" Research Paper in a Bibliography

Advanced Avionics in General Aviation the Issues Advantages and Disadvantages.” A1-TermPaper.com, 2011, https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567. Accessed 5 Oct 2024.

Advanced Avionics in General Aviation the Issues Advantages and Disadvantages (2011). Retrieved from https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567
A1-TermPaper.com. (2011). Advanced Avionics in General Aviation the Issues Advantages and Disadvantages. [online] Available at: https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567 [Accessed 5 Oct, 2024].
”Advanced Avionics in General Aviation the Issues Advantages and Disadvantages” 2011. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567.
”Advanced Avionics in General Aviation the Issues Advantages and Disadvantages” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567.
[1] ”Advanced Avionics in General Aviation the Issues Advantages and Disadvantages”, A1-TermPaper.com, 2011. [Online]. Available: https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567. [Accessed: 5-Oct-2024].
1. Advanced Avionics in General Aviation the Issues Advantages and Disadvantages [Internet]. A1-TermPaper.com. 2011 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567
1. Advanced Avionics in General Aviation the Issues Advantages and Disadvantages. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/network-vulnerabilities-avionics/5468567. Published 2011. Accessed October 5, 2024.

Related Research Papers:

Problems With Cockpit Automation the Impact of Very Light Jets on Fbo Term Paper

Paper Icon

cockpit automation / the impact of very light jets on FBOs

Cockpit-FBO's

Problems with cockpit automation / the impact of very light jets on FBOs

Paper-1 Problems with cockpit automation… read more

Term Paper 20 pages (8023 words) Sources: 10 Style: APA Topic: Transportation / Mass Transit


Hangar Space a Physical Plant Term Paper

Paper Icon

Hangar Space - a Physical Plant

Hangar Space

Airport Facilities - Planning Hangar construction

The airports and the concepts regarding airport planning and construction have undergone vast changes. These relate… read more

Term Paper 25 pages (9159 words) Sources: 10 Topic: Transportation / Mass Transit


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!