2016 Integrated Communications Navigation and Surveillance (ICNS) 2016
DOI: 10.1109/icnsurv.2016.7486323
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of security and trust of mobile devices as digital avionics component

Abstract: Mobile devices are becoming part of modern digital avionics. Mobile devices can be applied to a range of scenarios, from Electronic Flight Bags to maintenance platforms, in order to manage and configure flight information, configure avionics networks or perform maintenance tasks (including offloading flight logs). It can be argued that recent developments show an increased use of personal mobile devices playing an integral part in the digital avionics industry. In this paper, we look into different proposals f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The concepts discovered are very similar to the revelation of how cyber threats have greatly affected online credibility. Akram and Markantonakis [15] presented an article that evaluated the security and trust challenges presented by mobile devices in various domains. They argue that the trust and security that would be required to prevent access to the information in enterprise mobility include; secure decommissioning, closely managing and monitoring the provision of applications to users, and utilize a trusted execution environment [16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The concepts discovered are very similar to the revelation of how cyber threats have greatly affected online credibility. Akram and Markantonakis [15] presented an article that evaluated the security and trust challenges presented by mobile devices in various domains. They argue that the trust and security that would be required to prevent access to the information in enterprise mobility include; secure decommissioning, closely managing and monitoring the provision of applications to users, and utilize a trusted execution environment [16].…”
Section: Related Workmentioning
confidence: 99%
“…They argue that the trust and security that would be required to prevent access to the information in enterprise mobility include; secure decommissioning, closely managing and monitoring the provision of applications to users, and utilize a trusted execution environment [16]. Generally, Ratchford et al, [14], Akram and Markantonakis [15], and Raj [16] present literature reviews that are purposely in-depth on responding to security issues associated with enterprise mobility. They form many concepts of security mitigation that are similar to current demand for securty integrations.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, a crucial component that supports aircraft devices security is the trusted boot process discussed in [5]. The security, trust and assurance issues related to the fact of bringing a user device into an aircraft network are evaluated in [21].…”
Section: B Related Work On Awn Security Concernsmentioning
confidence: 99%
“…Beside this, a crucial component of the security of aircraft devices is the trusted boot process discussed in [27]. The security, trust and assurance issues related to bringing a user device into an aircraft network are evaluated in [28].…”
Section: A Related Work On Security Concernsmentioning
confidence: 99%