航空通信基础设施安全

A. Karmarkar, L. Martin
{"title":"航空通信基础设施安全","authors":"A. Karmarkar, L. Martin","doi":"10.1109/ICNSURV.2012.6218392","DOIUrl":null,"url":null,"abstract":"In support of NextGen data communications applications, the FAA (Federal Aviation Authority) and the other ANSPs (Air Navigation Service Providers) plan to share the existing data radio currently used for supporting airline operations. Traditionally, ANSPs have operated all their communication in a relatively closed network environment. Air Traffic control data communications between the controller and the pilot; using existing Communication Service Provider (CSP) infrastructure over the existing data radio exposes the air traffic control message traffic to vulnerabilities in the network outside the ANSP domain. The use of shared radio and the ground infrastructure necessitates operation in a relatively open network environment where the ANSP network is interconnected with the CSP network which in turn is connected to airlines operations. Network hackers can probe for vulnerabilities in the network and launch a covert network attack at an appropriate time. While the air to ground communication security is subjected to collaborative standards evolution, there is a need to address the potential of distributed network attacks that may be launched from outside on the ground network. This paper explores potential vulnerabilities in the ground network, possible techniques to mitigate attacks, such as distributed denial of service attacks launched by hackers on the ground infrastructure outside the ANSP domain. The network attacks described in this paper are not restricted to data communications they are equally applicable to surveillance systems. The paper also explores the heightened possibility of penetrating the ANSP infrastructure firewall when network attacks are in progress.","PeriodicalId":126055,"journal":{"name":"2012 Integrated Communications, Navigation and Surveillance Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Aviation communication infrastructure security\",\"authors\":\"A. Karmarkar, L. Martin\",\"doi\":\"10.1109/ICNSURV.2012.6218392\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In support of NextGen data communications applications, the FAA (Federal Aviation Authority) and the other ANSPs (Air Navigation Service Providers) plan to share the existing data radio currently used for supporting airline operations. Traditionally, ANSPs have operated all their communication in a relatively closed network environment. Air Traffic control data communications between the controller and the pilot; using existing Communication Service Provider (CSP) infrastructure over the existing data radio exposes the air traffic control message traffic to vulnerabilities in the network outside the ANSP domain. The use of shared radio and the ground infrastructure necessitates operation in a relatively open network environment where the ANSP network is interconnected with the CSP network which in turn is connected to airlines operations. Network hackers can probe for vulnerabilities in the network and launch a covert network attack at an appropriate time. While the air to ground communication security is subjected to collaborative standards evolution, there is a need to address the potential of distributed network attacks that may be launched from outside on the ground network. This paper explores potential vulnerabilities in the ground network, possible techniques to mitigate attacks, such as distributed denial of service attacks launched by hackers on the ground infrastructure outside the ANSP domain. The network attacks described in this paper are not restricted to data communications they are equally applicable to surveillance systems. The paper also explores the heightened possibility of penetrating the ANSP infrastructure firewall when network attacks are in progress.\",\"PeriodicalId\":126055,\"journal\":{\"name\":\"2012 Integrated Communications, Navigation and Surveillance Conference\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Integrated Communications, Navigation and Surveillance Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNSURV.2012.6218392\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Integrated Communications, Navigation and Surveillance Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNSURV.2012.6218392","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

为了支持NextGen数据通信应用,美国联邦航空局(FAA)和其他空中导航服务提供商(ansp)计划共享目前用于支持航空公司运营的现有数据无线电。传统上,ansp在相对封闭的网络环境中进行所有通信。管制员与飞行员之间的空中交通管制数据通信;在现有的数据无线电上使用现有的通信服务提供商(CSP)基础设施将空中交通管制消息流量暴露给了ANSP域外网络中的漏洞。共享无线电和地面基础设施的使用需要在一个相对开放的网络环境中运行,其中ANSP网络与CSP网络相互连接,而CSP网络又与航空公司的运营相连接。网络黑客可以探测到网络中的漏洞,并在适当的时候发动隐蔽的网络攻击。虽然空对地通信安全受到协作标准演变的影响,但有必要解决可能从地面网络外部发起的分布式网络攻击的潜在问题。本文探讨了地面网络中的潜在漏洞,以及减轻攻击的可能技术,例如黑客在ANSP域外的地面基础设施上发起的分布式拒绝服务攻击。本文所描述的网络攻击并不局限于数据通信,它们同样适用于监控系统。本文还探讨了当网络攻击正在进行时,穿透ANSP基础设施防火墙的可能性增加。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Aviation communication infrastructure security
In support of NextGen data communications applications, the FAA (Federal Aviation Authority) and the other ANSPs (Air Navigation Service Providers) plan to share the existing data radio currently used for supporting airline operations. Traditionally, ANSPs have operated all their communication in a relatively closed network environment. Air Traffic control data communications between the controller and the pilot; using existing Communication Service Provider (CSP) infrastructure over the existing data radio exposes the air traffic control message traffic to vulnerabilities in the network outside the ANSP domain. The use of shared radio and the ground infrastructure necessitates operation in a relatively open network environment where the ANSP network is interconnected with the CSP network which in turn is connected to airlines operations. Network hackers can probe for vulnerabilities in the network and launch a covert network attack at an appropriate time. While the air to ground communication security is subjected to collaborative standards evolution, there is a need to address the potential of distributed network attacks that may be launched from outside on the ground network. This paper explores potential vulnerabilities in the ground network, possible techniques to mitigate attacks, such as distributed denial of service attacks launched by hackers on the ground infrastructure outside the ANSP domain. The network attacks described in this paper are not restricted to data communications they are equally applicable to surveillance systems. The paper also explores the heightened possibility of penetrating the ANSP infrastructure firewall when network attacks are in progress.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploring a flight deck based wake turbulence situational awareness tool From the drawing board to reality: Packaging tomorrow's aviation system Full 4D trajectory management - Ground Industry point of view Dependence of aeromacs interference on airport radiation pattern characteristics A comparison of noise abatement procedures using radar data and simulated flight trajectories
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1