Aviation communication infrastructure security

A. Karmarkar, L. Martin
{"title":"Aviation communication infrastructure security","authors":"A. Karmarkar, L. Martin","doi":"10.1109/ICNSURV.2012.6218392","DOIUrl":null,"url":null,"abstract":"In support of NextGen data communications applications, the FAA (Federal Aviation Authority) and the other ANSPs (Air Navigation Service Providers) plan to share the existing data radio currently used for supporting airline operations. Traditionally, ANSPs have operated all their communication in a relatively closed network environment. Air Traffic control data communications between the controller and the pilot; using existing Communication Service Provider (CSP) infrastructure over the existing data radio exposes the air traffic control message traffic to vulnerabilities in the network outside the ANSP domain. The use of shared radio and the ground infrastructure necessitates operation in a relatively open network environment where the ANSP network is interconnected with the CSP network which in turn is connected to airlines operations. Network hackers can probe for vulnerabilities in the network and launch a covert network attack at an appropriate time. While the air to ground communication security is subjected to collaborative standards evolution, there is a need to address the potential of distributed network attacks that may be launched from outside on the ground network. This paper explores potential vulnerabilities in the ground network, possible techniques to mitigate attacks, such as distributed denial of service attacks launched by hackers on the ground infrastructure outside the ANSP domain. The network attacks described in this paper are not restricted to data communications they are equally applicable to surveillance systems. The paper also explores the heightened possibility of penetrating the ANSP infrastructure firewall when network attacks are in progress.","PeriodicalId":126055,"journal":{"name":"2012 Integrated Communications, Navigation and Surveillance Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Integrated Communications, Navigation and Surveillance Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNSURV.2012.6218392","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In support of NextGen data communications applications, the FAA (Federal Aviation Authority) and the other ANSPs (Air Navigation Service Providers) plan to share the existing data radio currently used for supporting airline operations. Traditionally, ANSPs have operated all their communication in a relatively closed network environment. Air Traffic control data communications between the controller and the pilot; using existing Communication Service Provider (CSP) infrastructure over the existing data radio exposes the air traffic control message traffic to vulnerabilities in the network outside the ANSP domain. The use of shared radio and the ground infrastructure necessitates operation in a relatively open network environment where the ANSP network is interconnected with the CSP network which in turn is connected to airlines operations. Network hackers can probe for vulnerabilities in the network and launch a covert network attack at an appropriate time. While the air to ground communication security is subjected to collaborative standards evolution, there is a need to address the potential of distributed network attacks that may be launched from outside on the ground network. This paper explores potential vulnerabilities in the ground network, possible techniques to mitigate attacks, such as distributed denial of service attacks launched by hackers on the ground infrastructure outside the ANSP domain. The network attacks described in this paper are not restricted to data communications they are equally applicable to surveillance systems. The paper also explores the heightened possibility of penetrating the ANSP infrastructure firewall when network attacks are in progress.
航空通信基础设施安全
为了支持NextGen数据通信应用,美国联邦航空局(FAA)和其他空中导航服务提供商(ansp)计划共享目前用于支持航空公司运营的现有数据无线电。传统上,ansp在相对封闭的网络环境中进行所有通信。管制员与飞行员之间的空中交通管制数据通信;在现有的数据无线电上使用现有的通信服务提供商(CSP)基础设施将空中交通管制消息流量暴露给了ANSP域外网络中的漏洞。共享无线电和地面基础设施的使用需要在一个相对开放的网络环境中运行,其中ANSP网络与CSP网络相互连接,而CSP网络又与航空公司的运营相连接。网络黑客可以探测到网络中的漏洞,并在适当的时候发动隐蔽的网络攻击。虽然空对地通信安全受到协作标准演变的影响,但有必要解决可能从地面网络外部发起的分布式网络攻击的潜在问题。本文探讨了地面网络中的潜在漏洞,以及减轻攻击的可能技术,例如黑客在ANSP域外的地面基础设施上发起的分布式拒绝服务攻击。本文所描述的网络攻击并不局限于数据通信,它们同样适用于监控系统。本文还探讨了当网络攻击正在进行时,穿透ANSP基础设施防火墙的可能性增加。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信