Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2663501.2663502guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article
Free access

Threat modeling for aircraft access to national airspace system wide information management program

Published: 13 April 2014 Publication History

Abstract

Within the Federal Aviation Administration's (FAA) NextGen project, System Wide Information Management (SWIM) program is the essential core in facilitating the collaborative access to the aviation information by various stakeholders. The Aircraft Access to SWIM (AAtS) is a Service Oriented Architecture (SOA) that provides the technical platform for the exchange of situational information between the aircraft and the National Airspace System (NAS). In this research project, we investigate the challenges in one and two way communication between the Electronic Flight Bag (EFB) and the SWIM network architecture. EFBs are utilized for allowing aircrafts' access to SWIM through a Data Link Service (DLS) provided by a Data Link Service Provider (DLSP). Issues such as cybersecurity, performance, availability, and quality of service in the AAtS are investigated and mitigation approaches toward more secure and efficient service provided to the aircraft and to NAS are discussed. To this end, a set of comprehensive tests are carried out in an emulated network in a lab environment to identify and assess some of the issues associated with quality of service (QoS) as well as cybersecurity in both wired and wireless connectivity of Electronic Flight Bags (EFBs). This work also aims to assess the efficiency of different approaches in the downlink and uplink data transmission between aircraft and the AAtS system. Nine operational scenarios are identified in AAtS, where they are tested with three technical communication scenarios that are further correlated with messaging patterns using web-services.

References

[1]
"NextGen Implementation plan" FAA report June 2013.
[2]
Jere S. Meserole, and John W. Moore. "What is System Wide Information Management (SWIM)?." Aerospace and Electronic Systems Magazine, IEEE 22.5, pp 13--19, 2007.
[3]
"Aircraft Access to SWIM (AAtS) Concept of Operations (ConOps)", FAA technical report, July 31 2013.
[4]
"Aircraft Access to SWIM Implementation Guidance Document", FAA technical report, March 1 2013.
[5]
"Aircraft Access to SWIM Full Data Exchange Technical Concept Paper", FAA technical report, July 31 2013.
[6]
W. S. Mossberg, "Internet-a-Gogo: Airlines to offer inflight access." The Wall Street Journal, 2008.
[7]
Cita M. Furlani, "Minimum Security Requirements for Federal Information and Information Systems". DIANE Publishing, 2009.
[8]
Robert W. Shirey, "Internet security glossary", 2000. Available at: http://tools.ietf.org/html/rfc2828, accessed Oct. 2013.
[9]
Ferreri, Francesco, Massimo Bernaschi, and Leonardo Valcamonici. "Access points vulnerabilities to DoS attacks in 802.11 networks." In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, vol. 1, pp. 634--638. IEEE, 2004.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CNS '14: Proceedings of the 17th Communications & Networking Simulation Symposium
April 2014
55 pages

Sponsors

  • (SCS): The Society for Modeling and Simulation International

Publisher

Society for Computer Simulation International

San Diego, CA, United States

Publication History

Published: 13 April 2014

Author Tags

  1. DEVS
  2. discrete event system specification
  3. mobile networks

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 225
    Total Downloads
  • Downloads (Last 12 months)48
  • Downloads (Last 6 weeks)9
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media