2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC) 2015
DOI: 10.1109/dasc.2015.7311416
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of security and trust in Avionics Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…Challenges to an AWN are from known attacks on the wireless nodes of the network. Few known attacks in wireless networks along with possible solutions are discussed in (Akram et al, 2015): ARP spoofing attack: This involves an adversary trying to associate his MAC address with the IP address of a genuine node. ARP spoofing attack can be avoided by node authentication using asymmetric cryptography.…”
Section: Security In Avionics Wireless Networkmentioning
confidence: 99%
“…Challenges to an AWN are from known attacks on the wireless nodes of the network. Few known attacks in wireless networks along with possible solutions are discussed in (Akram et al, 2015): ARP spoofing attack: This involves an adversary trying to associate his MAC address with the IP address of a genuine node. ARP spoofing attack can be avoided by node authentication using asymmetric cryptography.…”
Section: Security In Avionics Wireless Networkmentioning
confidence: 99%
“…The explicit trust assurance should be provided by the (aircraft) device that is participating in the AWN communication. This would build in an assurance that only secure and trusted devices (explicitly trusted devices with per-protocol run assurance) will participate in the AWN, potentially countering physically altered devices and/or re-introduction of a decommissioned device as discussed in [3,5].…”
Section: A Rationalementioning
confidence: 99%
“…As reported by [1], roughly 30 percent of wires are potential candidates for wireless substitutes. Therefore, as highlighted in [3], wireless solutions have more than reasonable prospects as long as security, safety and high reliability can be maintained.…”
Section: Introductionmentioning
confidence: 99%
“…This will not only ensure that the communication channel is protected and devices are authenticated but also that the status of applications on the devices are also secure (and free of any malicious alterations). For an in-depth analysis and security recommendations on how to design a secure channel for digital avionics systems, please refer to [10].…”
Section: Strong Secure and Trusted Channelsmentioning
confidence: 99%