This paper presents an original and adaptive security architecture for the future connected aircrafts. A secure system topology for the embedded network is proposed with regards to network and system constraints, service priorities and regulatory recommendations. The design of a new component called Security Manager (SecMan) is explained in details and all its processes are formalized for a better understanding of the proposal made in this paper. A performance study is done in order to assess the advantages of this adaptive security policy within some critical aircraft communication scenarios.
Network engineers and designers need additional tools to generate network traffic in order to test and evaluate, for instance, application performances or network provisioning. In such a context, traffic characteristics are the most important part of the work. Indeed, it is quite easy to generate traffic, but it is more difficult to produce traffic which can exhibit real characteristics such as the ones you can observe through the Internet. With the lack of adequate tools to generate data flows with "realistic behaviors" at the network or transport level, we needed to develop our tool entitled "SourcesOnOff". The emphasis of this article is on presenting this tool, explaining how we implemented it and outlining the methodology it follows to produce traffic with realistic characteristics.
International audienceAeronautical communications are growing in complexity: avionic systems are more and more connected together through complex networks inside and outside the aircraft. This increase of connections requires highly secure systems to solve the constraints of such network topologies. In this paper, we present the IP based Secure Next Generation Router (SNG router) we have developed, providing regulation, routing, secure merging of different data sources and preserving of their segregation. During the design process we searched for a set of solutions to minimize the certification, design and development costs and maintain a high level of security. This paper is organized as follow: we first introduce the methodology we applied to the SNG router and its benefits. Then we examine the partition in charge of the security of data exchanged through the router. The paper is finished with the validation of our router?s implementation and with the evaluation of our router?s performances
Network engineers and designers need additional tools to generate network traffic in order to test and evaluate application performances or network provisioning for instance. In such a context, traffic characteristics are the very important part of the work. Indeed, it is quite easy to generate traffic but it is more difficult to produce traffic which can exhibit real characteristics such as the ones you can observe in the Internet. With the lack of adequate tools to generate data flows with "realistic behaviors" at the network or transport level, we needed to develop our tool entitled "SourcesOnOff". The emphasis of this article is on presenting this tool, how we implemented it and which methodology it follows to produce traffic with realistic characteristics. To do so, we chose to consider different stochastic processes in order to model the complexity of the different original traffics we wanted to replay. In our approach, we are able to consider several statistical laws and to combine their effects to model accurately the original behavior we analyzed in the real data. We then select the right parameters to consider as inputs for our SourcesOnOff tool. This approach gives really good traffic characteristics and, consequently, the generated traffic is really closed to reality as results presented at this end of this paper demonstrate it.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.