Threat modeling for aircraft access to national airspace system wide information management program
Article No.: 1, Pages 1 - 8
Abstract
Within the Federal Aviation Administration's (FAA) NextGen project, System Wide Information Management (SWIM) program is the essential core in facilitating the collaborative access to the aviation information by various stakeholders. The Aircraft Access to SWIM (AAtS) is a Service Oriented Architecture (SOA) that provides the technical platform for the exchange of situational information between the aircraft and the National Airspace System (NAS). In this research project, we investigate the challenges in one and two way communication between the Electronic Flight Bag (EFB) and the SWIM network architecture. EFBs are utilized for allowing aircrafts' access to SWIM through a Data Link Service (DLS) provided by a Data Link Service Provider (DLSP). Issues such as cybersecurity, performance, availability, and quality of service in the AAtS are investigated and mitigation approaches toward more secure and efficient service provided to the aircraft and to NAS are discussed. To this end, a set of comprehensive tests are carried out in an emulated network in a lab environment to identify and assess some of the issues associated with quality of service (QoS) as well as cybersecurity in both wired and wireless connectivity of Electronic Flight Bags (EFBs). This work also aims to assess the efficiency of different approaches in the downlink and uplink data transmission between aircraft and the AAtS system. Nine operational scenarios are identified in AAtS, where they are tested with three technical communication scenarios that are further correlated with messaging patterns using web-services.
References
[1]
"NextGen Implementation plan" FAA report June 2013.
[2]
Jere S. Meserole, and John W. Moore. "What is System Wide Information Management (SWIM)?." Aerospace and Electronic Systems Magazine, IEEE 22.5, pp 13--19, 2007.
[3]
"Aircraft Access to SWIM (AAtS) Concept of Operations (ConOps)", FAA technical report, July 31 2013.
[4]
"Aircraft Access to SWIM Implementation Guidance Document", FAA technical report, March 1 2013.
[5]
"Aircraft Access to SWIM Full Data Exchange Technical Concept Paper", FAA technical report, July 31 2013.
[6]
W. S. Mossberg, "Internet-a-Gogo: Airlines to offer inflight access." The Wall Street Journal, 2008.
[7]
Cita M. Furlani, "Minimum Security Requirements for Federal Information and Information Systems". DIANE Publishing, 2009.
[8]
Robert W. Shirey, "Internet security glossary", 2000. Available at: http://tools.ietf.org/html/rfc2828, accessed Oct. 2013.
[9]
Ferreri, Francesco, Massimo Bernaschi, and Leonardo Valcamonici. "Access points vulnerabilities to DoS attacks in 802.11 networks." In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, vol. 1, pp. 634--638. IEEE, 2004.
Index Terms
- Threat modeling for aircraft access to national airspace system wide information management program
Recommendations
Unmanned aircraft systems in the national airspace system: a formal methods perspective
As the technological and operational capabilities of unmanned aircraft systems (UAS) have grown, so too have international efforts to integrate UAS into civil airspace. However, one of the major concerns that must be addressed in realizing this ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
April 2014
55 pages
Sponsors
- (SCS): The Society for Modeling and Simulation International
Publisher
Society for Computer Simulation International
San Diego, CA, United States
Publication History
Published: 13 April 2014
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 225Total Downloads
- Downloads (Last 12 months)48
- Downloads (Last 6 weeks)9
Reflects downloads up to 26 Sep 2024
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in