Aviation Cybersecurity: Foundations, principles, and applications
2: Department of Electrical and Computer Engineering, Air Force Institute of Technology, Ohio, USA
3: German Aerospace Center, Institute of Communications and Navigation, Germany
4: Aviation Guidance Department, Israeli National Cyber Directorate, Israel
5: School of Graduate Studies, College of Aviation, Embry-Riddle Aeronautical University, Daytona Beach, Florida, USA
Aircraft are becoming increasingly reliant on computing and networking technologies, with the advent of the Internet of Things, but this makes them vulnerable to cyber-attacks. This multidisciplinary book is at the cross section of aircraft systems, cybersecurity, and defence technologies. It covers the very latest in defending military and commercial aircraft against cyber-attacks. The interdisciplinary nature of aviation cybersecurity and its wide-ranging impact in various arenas require contributions of expertise from multiple disciplines to collaborate in identifying the most feasible ways forward. This book provides an understanding of the key technical, social and legal issues in aviation cybersecurity, explains the range of technical challenges involved, and proposes innovative solutions. Aviation Cybersecurity: Foundations, principles, and applications is a valuable resource for aviation and cybersecurity researchers and professionals in academia, industry, and military organisations.
Inspec keywords: security of data; aircraft communication; autonomous aerial vehicles; aerospace computing
Other keywords: security of data; embedded systems; aircraft communication; data privacy; remotely operated vehicles; avionics; autonomous aerial vehicles; aerospace computing; telecommunication security; smart power grids
Subjects: Aerospace engineering computing; General electrical engineering topics; Mobile radio systems; General and management topics; Computer communications; Aerospace control; Data security; Mobile robots; Education and training
- Book DOI: 10.1049/SBRA545E
- Chapter DOI: 10.1049/SBRA545E
- ISBN: 9781839533211
- e-ISBN: 9781839533228
- Page count: 309
- Format: PDF
-
Front Matter
- + Show details - Hide details
-
p.
(1)
-
1 Counter unmanned aerial vehicle for aviation security
- + Show details - Hide details
-
p.
1
–30
(30)
In this chapter, we provide a comprehensive discussion of existing literature in the area of UAS detection and negation, identify the challenges in countering adversary UAS, and evaluate the trends against UAS-based threats. The objective of this chapter is to present a systematic introduction of C-UAS technologies, thus fostering a research community committed to the safe integration of UAS into the airspace system.
-
2 Formal verification of safety-critical software using SPARK
- + Show details - Hide details
-
p.
31
–48
(18)
The increasing size, complexity, and interconnectedness of software-intensive systems are raising concerns about how to affordably ensure such systems are free of cybersecurity vulnerabilities and other faults, because even the smallest of faults can have severe safety and financial repercussions. Unfortunately, typical test-based approaches only achieve partial coverage of all possible software behaviors, leaving room for faults to go undetected. A possible solution is to supplement testing with the use of formal methods, i.e., mathematically based tools and techniques that verify software and other design artifacts through formal proof and rigorous analysis. In this chapter, we show how SPARK, a programming language and associated formal verification toolset, can be used to help prevent cybersecurity vulnerabilities and other software faults. We also give an overview of industrial efforts that have successfully used SPARK for this purpose, paying particular attention to how SPARK has been used in conjunction with other formal methods and more traditional test-and review-based approaches to increase software quality and reliability.
-
3 Drone surveillance system—RF/WiFi-based drone detection, localization, and tracking: a survey
- + Show details - Hide details
-
p.
49
–81
(33)
Unmanned Air Vehicles (UAVs), also known as drones, have become dominant recently in all fields including military, commercial, and other multiapplications, such as agriculture, search and rescue, infrastructures monitoring, and surveillance, especially for safety and security purposes. On one hand, deployment of UAVs has facilitated end-users and, on the other hand, this enormous increase in the usage of UAVs has raised many concerns with regard to security, harm, threats, and privacy issues by different agencies, governments, private organizations even by people in their residencies, which has stimulated and motivated many researchers toward the designing of anti-drone systems in order to be secure from such risks. The main objective of this chapter is to provide a comprehensive survey concerning the work carried out in the designing of an anti-drone system for detection, localization, and tracking using Radio Frequency (RF-) and WiFi-based techniques. In the category of drone detection, drone identification, and classification are also being explored. In more detail, this chapter will highlight the key factors of the surveyed techniques and the characteristics of such systems to deploy them, practically. Indeed, current studies provide systematic ways to understand the procedures, methods, tools, and techniques, as well as experimental setups, which have been carried out for the implementation of drone-surveillance systems. A comparison of the performance, found in the literature, of the designed systems in this field is presented and analysed. Finally, open challenges, possible future research trends, and direction are highlighted in the context of drone detection, localization, and tracking systems. The presented survey chapter is aimed at providing a guide for the research community as it could be an ignition to work further with specific direction so making these crucial systems versatile and ready to be deployed practically to meet their potential market demand.
-
4 Cybersecurity for the L-band Digital Aeronautical Communications System (LDACS)
- + Show details - Hide details
-
p.
83
–121
(39)
Today's analog voice-based air-ground communication system for tactical aircraft guidance is suffering from the VHF band's increasing saturation in high-density areas. The air-ground communication infrastructure is therefore undergoing digitization to ensure the sustainable growth of the air transportation system in the coming decades. As safety and security are strongly interrelated in aviation, strong cybersecurity is the foundation and enabler for digitalization in aviation. One of the new air-ground data links that shall enable this transformation is the L-band Digital Aeronautical Communication System (LDACS). It will be the primary long-range terrestrial data link of the future IP-based aeronautical telecommunications network. In this chapter, we describe the design process, draft, and the state-of-the-art cybersecurity architecture for LDACS.
-
5 Using terrestrial ranging to monitor GNSS for targeted RF interference
- + Show details - Hide details
-
p.
123
–140
(18)
Global navigation satellite systems (GNSS) have become the primary means of navigation for civil aviation. The development of required navigation performance (RNP) has set new expectations for the availability of GNSS-based integrity services. However, there is a fundamental frontier in the detectability of large-scale faults in methods based on receiver autonomous integrity monitoring (RAIM) or advanced RAIM (ARAIM). RAIM and ARAIM derive integrity guarantees from the consistency of GNSS-based measurements, so that faults with consistent effects across various satellites, such as might be caused by a multi-constellation fault or intentional spoofing, are at risk of being undetectable with RAIM-based monitors. In this chapter, we propose a way of reducing the risk by complementing GNSS with terrestrial measurements.
-
6 Security risk assessments and countermeasures for future aeronautical communication network architecture
- + Show details - Hide details
-
p.
141
–180
(40)
Cybersecurity vulnerabilities are relatively new regarding airworthiness in comparison with those encountered in terrestrial networks. The latest generation of aircraft such as Boeing and Airbus have included onboard aircraft data networks, which, on the one hand, offer innovative and robust ways of communications but, on the other hand, also introduce cybersecurity vulnerabilities to avionic communications. If these vulnerabilities are exploited, they may lead to irreparable damage to the information system that may cause a catastrophic failure. With this in mind, protection to the onboard data network and the data links between the air and ground communication infrastructure are of paramount importance. This chapter focuses on defining the future avionics communication system security architecture with security risk assessment and risk mitigation. It identifies the security requirements that future avionics communication system needs to comply with. A risk analysis is carried out to identify security assets and their security perimeters, vulnerability points, threats and attacks, the impacts of such threats, and the risk levels of threats with reference to the target future avionics communication network architecture. According to the risk analysis, security countermeasures are identified, which leads to the target network security architecture design. The method in the identification of the target network security architecture primarily follows the guidelines specified in EUROCAE ED-202 and CESG IAS standards. The future avionics communication network security architecture is directly related to airworthiness security, which is defined as the protection of the airworthiness of an aircraft from information security threats. EUROCAE and ARINC define frameworks in assessing security threats and the risks that they impose on aircraft safety. Examples of security countermeasures to detect and prevent malicious attacks on information security will also be provided. This chapter mainly serves as a recommendation for defining security processes and their implementation concerning the target network architecture.
-
7 Physical layer security in wireless HetNets avionics and satellite communication systems
- + Show details - Hide details
-
p.
181
–218
(38)
Today's aeronautical communications increasingly rely on wireless communication to exchange information within an aircraft, between aircrafts, between aircraft and the ground network, and between aircraft and the satellite. The future avionics communications industry foresees an amalgamation of different radio access technologies to provide sufficient bandwidth for the growing demand for avionics applications onboard the aircraft as well as on the ground. This amalgamation of different types of radio access technologies, on one hand, brings much-needed resources, but, on the other hand, it also leads to the growing numbers of cybersecurity attacks which point at different domains and attract a variety of cybersecurity attackers. Aeronautical networks consist of several interconnected devices that enable data management and ensure that the messages using the aircraft applications are exchanged within a given timeframe. This constraint makes the design of the communication system highly challenging because of the requirement of a guaranteed bandwidth and a pre-defined quality of service. These issues raise several security concerns as to the security of both personal and sensitive data. Almost within all wireless communication systems, the initial countermeasures for vulnerabilities such as authentication, integrity and confidentiality are employed in the top layers within the protocol stack using different encryption schemes that are based on mathematical operations and the security provided by the techniques is usually referred to as the computational security. Even though these techniques have shown to be very effective over the years but the research has shown that when the aim is to design a secure communication system, then the attributes of the physical layer such as its imperfections must also be considered, which can then result in additional security, e.g., in physical layer, white noise is considered an imperfection but this noise can be used to hide secure messages. If these techniques are employed in addition to the traditional security measures without the loss of data rate, then they can complement the traditional security techniques. This chapter aims to highlight some of the secrecy mechanisms and provide some insight into the physical layer techniques that can be employed for a secure and reliable transmission. The chapter will also highlight the performance metrics that are employed to evaluate the channel secrecy capacity and secrecy outage probability. Finally, to sum up, an example of a physical layer attack is presented, and it is shown how the PHY-layer security technique can be employed as a countermeasure.
-
8 Cybersecurity and privacy issues
- + Show details - Hide details
-
p.
219
–246
(28)
A variety of challenges to cybersecurity and privacy currently exist. Technical issues and human factor-related hurdles have brought forth a range of research efforts to help mitigate or resolve these challenges. Legislation plays a significant role in controlling the use of networks all around the United States. Currently, as the definition of cybersecurity is relatively new, the explicit reference of the concept of cybersecurity is scant. The first time that a published U.S. court even used the word "cybersecurity" was in a 2007 Seventh Circuit court opinion. The issues associated with the concept of cybersecurity such as data security, cyber risk, data breach, etc., have been taken very seriously by a number of U.S. state and federal statutes, regulations, and courts. Public outcry concerning unwarranted or unknown observation is nothing new. The privacy debate is inherent to American society so much so that the issue is embedded in the Fourth Amendment of the U.S. Constitution. With the advent of new surveillance technologies and techniques, concern that they may be used in violation of personal rights and protections has grown. Examples include wiretapping, electronic surveillance, video monitoring, and other types of law enforcement and related agency activities. In this chapter, we have identified themes that overlap with technologies related to cybersecurity. Furthermore, commonalities and occurrences in previous privacy-related confrontations were characterized in order to serve as a guide for efforts to resolve the cybersecurity privacy quandary.
-
9 Workforce training and development in cybersecurity
- + Show details - Hide details
-
p.
247
–264
(18)
As cybersecurity professionals' demands are surging, it is necessary to provide more learning opportunities for people interested in this field. In-depth education and training for the cybersecurity workforce are necessary. A large number of cybersecurity professionals are required, and high-quality talents are also wanted. This chapter raised two suggestions regarding the training of cybersecurity professionals. The first problem suggested that traditional colleges and universities open more online learning events and some free initiation classes to draw more attention to this field. The second problem recommended opening more high-end cybersecurity graduate programs to fulfil the requirements of high-end cybersecurity professionals. The graduate programs can relate to the undergraduate programs and contain similar specialty areas with intermediate and advanced level classes. For the graduate program, some specialty areas not covered in the undergraduate program can be introduced to give students a broader view, which may help them be a leader in a cybersecurity team with members from diverse backgrounds.
-
10 Aviation cybersecurity: a cyber-physical systems perspective
- + Show details - Hide details
-
p.
265
–281
(17)
The aviation sector has been experiencing an increasing revolution in the last century. It becomes a vital transporter for different purposes such as transport, cargo, delivery, and military purposes. The importance of aviation attracts governments and researchers to focus intensely on the aviation sector to improve aviation modernity and be robust. Recently, cyber-physical systems (CPSs) have emerged as intelligent embedded systems to improve areas such as aviation, smart grid, power systems, and aerospace sectors. Therefore, the CPSs have become prominent and eligible for the aviation sector to improve performance, productivity, reliability, safety, and efficiency to meet the stakeholder's satisfaction. On the other hand, applying CPS to the aviation sector opens new challenges related to system security caused by its operation neutrality. This chapter innovatively introduces the aviation CPSs (ACPSs) framework in terms of creating secure systems. Moreover, it discusses what are the possible policies and solutions to make this system robust and secure.
-
Back Matter
- + Show details - Hide details
-
p.
(1)