Skip to main content

2018 | OriginalPaper | Buchkapitel

Manipulating the Five V’s in the Next Generation Air Transportation System

verfasst von : Dustin Mink, William Bradley Glisson, Ryan Benton, Kim-Kwang Raymond Choo

Erschienen in: Security and Privacy in Communication Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The U.S. Next Generation Air Transportation System (NextGen) is designed to increase the capacity, safety and efficiency of the air traffic control via the integration of past experiences and advances in technology. However, the system is expected to greatly increase the amount and types of data generated as well as the knowledge to be managed. Additionally, as with all new technology, U.S. NextGen opens the specter of the potential impacts created by cyberattacks. Given this, it appears logical to view the U.S. NextGen system from the lens of Big Data. This study evaluates the U.S. NextGen system using the five differentiated qualitative characteristics of big data: Volume, Velocity, Variety, Veracity and Value. The results indicate that U.S. NextGen system has several big data challenges that must be addressed in order to obtain its maximal potential.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat U.S. Department of Transportation: Fact Sheet - FAA Forecast Fact Sheet-Fiscal Years 2016–2036, 2017 (2016) U.S. Department of Transportation: Fact Sheet - FAA Forecast Fact Sheet-Fiscal Years 2016–2036, 2017 (2016)
2.
Zurück zum Zitat Gillen, D., Morrison, W.G.: Aviation security: costing, pricing, finance and performance. J. Air Transp. Manage. 48, 1–12 (2015)CrossRef Gillen, D., Morrison, W.G.: Aviation security: costing, pricing, finance and performance. J. Air Transp. Manage. 48, 1–12 (2015)CrossRef
3.
Zurück zum Zitat Committee on Appropriations: FY2017 Homeland Security Appropriations Bill Cleared for Committee Debate, 2017 (2016) Committee on Appropriations: FY2017 Homeland Security Appropriations Bill Cleared for Committee Debate, 2017 (2016)
4.
Zurück zum Zitat Kaspersen, A.: Four threats to aviation security – and four responses, 2017 (2016) Kaspersen, A.: Four threats to aviation security – and four responses, 2017 (2016)
5.
Zurück zum Zitat BBC News: Brussels explosions: what we know about airport and metro attacks, 2017 (2016) BBC News: Brussels explosions: what we know about airport and metro attacks, 2017 (2016)
6.
Zurück zum Zitat BBC News: MH17 Ukraine plane crash: what we know, 2017 (2016) BBC News: MH17 Ukraine plane crash: what we know, 2017 (2016)
7.
Zurück zum Zitat AirlineReporter: Updated: Malaysia Airlines Flight 370 Has Likely Crashed But Where? 2017 (2014) AirlineReporter: Updated: Malaysia Airlines Flight 370 Has Likely Crashed But Where? 2017 (2014)
8.
Zurück zum Zitat United States Government Accountability Office: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen, 2017 (2015) United States Government Accountability Office: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen, 2017 (2015)
9.
Zurück zum Zitat Strohmeier, M., Martinovic, I.: On passive data link layer fingerprinting of aircraft transponders. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, pp. 1–9. ACM, Denver (2015) Strohmeier, M., Martinovic, I.: On passive data link layer fingerprinting of aircraft transponders. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, pp. 1–9. ACM, Denver (2015)
10.
Zurück zum Zitat Costin, A.: Ghost is in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black Hat USA (2012) Costin, A.: Ghost is in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black Hat USA (2012)
11.
Zurück zum Zitat Strohmeier, M., Schafer, M., Lenders, V., Martinovic, I.: Realities and challenges of nextgen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52, 111–118 (2014)CrossRef Strohmeier, M., Schafer, M., Lenders, V., Martinovic, I.: Realities and challenges of nextgen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52, 111–118 (2014)CrossRef
12.
Zurück zum Zitat Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404–409 (2013) Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404–409 (2013)
13.
Zurück zum Zitat Berman, K., Glisson, W.B., Glisson, L.M.: Investigating the impact of global positioning system (GPS) evidence in court cases. In: Hawaii International Conference on System Sciences (HICSS-48). IEEE, Kauai (2015) Berman, K., Glisson, W.B., Glisson, L.M.: Investigating the impact of global positioning system (GPS) evidence in court cases. In: Hawaii International Conference on System Sciences (HICSS-48). IEEE, Kauai (2015)
14.
Zurück zum Zitat McMillan, J., Glisson, W.B., Bromby, M.: Investigating the increase in mobile phone evidence in criminal activities. In: Hawaii International Conference on System Sciences (HICSS-46). IEEE, Wailea (2013) McMillan, J., Glisson, W.B., Bromby, M.: Investigating the increase in mobile phone evidence in criminal activities. In: Hawaii International Conference on System Sciences (HICSS-46). IEEE, Wailea (2013)
15.
Zurück zum Zitat Mink, D., Yasinsac, A., Choo, K.-K.R., Glisson, W.B.: Next generation aircraft architecture and digital forensic. In: Americas Conference on Information Systems (AMCIS). Americas Conference on Information Systems, San Diego (2016) Mink, D., Yasinsac, A., Choo, K.-K.R., Glisson, W.B.: Next generation aircraft architecture and digital forensic. In: Americas Conference on Information Systems (AMCIS). Americas Conference on Information Systems, San Diego (2016)
16.
Zurück zum Zitat Moallemi, M., Castro-Peña, C.A., Towhidnejad, M., Abraham, B.: Information security in the aircraft access to system wide information management infrastructure. In: 2016 Integrated Communications Navigation and Surveillance (ICNS), pp. 1A3-1–1A3-7 (2016) Moallemi, M., Castro-Peña, C.A., Towhidnejad, M., Abraham, B.: Information security in the aircraft access to system wide information management infrastructure. In: 2016 Integrated Communications Navigation and Surveillance (ICNS), pp. 1A3-1–1A3-7 (2016)
17.
Zurück zum Zitat He, D., Kumar, N., Choo, K.K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans. Inf. Forens. Secur. 12, 454–464 (2017)CrossRef He, D., Kumar, N., Choo, K.K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans. Inf. Forens. Secur. 12, 454–464 (2017)CrossRef
18.
Zurück zum Zitat Varga, M., Polgár, Z.A., Hedeşiu, H.: ADS-B based real-time air traffic monitoring system. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 215–219 (2015) Varga, M., Polgár, Z.A., Hedeşiu, H.: ADS-B based real-time air traffic monitoring system. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 215–219 (2015)
19.
Zurück zum Zitat Boci, E., Thistlethwaite, S.: A novel big data architecture in support of ADS-B data analytic. In: 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), pp. C1-1–C1-8 (2015) Boci, E., Thistlethwaite, S.: A novel big data architecture in support of ADS-B data analytic. In: 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), pp. C1-1–C1-8 (2015)
20.
Zurück zum Zitat Li, W., Kamal, P.: Integrated aviation security for defense-in-depth of next generation air transportation system. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 136–142 (2011) Li, W., Kamal, P.: Integrated aviation security for defense-in-depth of next generation air transportation system. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 136–142 (2011)
21.
Zurück zum Zitat Samuelson, K., Valovage, E., Hall, D.: Enhanced ADS-B research. In: IEEE Aerospace Conference, pp. 1–7 (2006) Samuelson, K., Valovage, E., Hall, D.: Enhanced ADS-B research. In: IEEE Aerospace Conference, pp. 1–7 (2006)
22.
Zurück zum Zitat Robinson, R.V., Sampigethaya, K., Li, M., Lintelman, S., Poovendran, R., Oheimb, D.V.: Secure network-enabled commercial airplane operations: it support infrastructure challenges. In: First CEAS European Air Space Conference, pp. 1–10 (2007) Robinson, R.V., Sampigethaya, K., Li, M., Lintelman, S., Poovendran, R., Oheimb, D.V.: Secure network-enabled commercial airplane operations: it support infrastructure challenges. In: First CEAS European Air Space Conference, pp. 1–10 (2007)
23.
Zurück zum Zitat Kacem, T., Wijesekera, D., Costa, P.: Integrity and authenticity of ADS-B broadcasts. In: IEEE Aerospace Conference, pp. 1–8 (2015) Kacem, T., Wijesekera, D., Costa, P.: Integrity and authenticity of ADS-B broadcasts. In: IEEE Aerospace Conference, pp. 1–8 (2015)
24.
Zurück zum Zitat Tassone, C.F.R., Martini, B., Choo, K.-K.R.: Visualizing digital forensic datasets: a proof of concept. J. Forensic Sci. 62, 1197–1204 (2017)CrossRef Tassone, C.F.R., Martini, B., Choo, K.-K.R.: Visualizing digital forensic datasets: a proof of concept. J. Forensic Sci. 62, 1197–1204 (2017)CrossRef
25.
Zurück zum Zitat Oates, B.J.: Researching Information Systems and Computing (2006) Oates, B.J.: Researching Information Systems and Computing (2006)
26.
Zurück zum Zitat Dong, X.L., Srivastava, D.: Big data integration. In: IEEE 29th International Conference on Data Engineering (ICDE), pp. 1245–1248 (2013) Dong, X.L., Srivastava, D.: Big data integration. In: IEEE 29th International Conference on Data Engineering (ICDE), pp. 1245–1248 (2013)
27.
Zurück zum Zitat U.S. Department of Transportation’s Bureau of Transportation Statistics: Transportation Statistics Annual Report 2016 (2016) U.S. Department of Transportation’s Bureau of Transportation Statistics: Transportation Statistics Annual Report 2016 (2016)
28.
Zurück zum Zitat Marsh, R., Ogaard, K.: Mining heterogeneous ADS-B data sets for probabilistic models of pilot behavior. In: IEEE International Conference on Data Mining Workshops, pp. 606–612 (2010) Marsh, R., Ogaard, K.: Mining heterogeneous ADS-B data sets for probabilistic models of pilot behavior. In: IEEE International Conference on Data Mining Workshops, pp. 606–612 (2010)
29.
Zurück zum Zitat Finke, C., Butts, J., Mills, R.: ADS-B encryption: confidentiality in the friendly skies. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1–4. ACM, Oak Ridge (2013) Finke, C., Butts, J., Mills, R.: ADS-B encryption: confidentiality in the friendly skies. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1–4. ACM, Oak Ridge (2013)
30.
Zurück zum Zitat Chen, T.-C.: An authenticated encrption scheme for automatic dependent surveillance-broadcast. IEEE Commun. Mag. (2012) Chen, T.-C.: An authenticated encrption scheme for automatic dependent surveillance-broadcast. IEEE Commun. Mag. (2012)
31.
Zurück zum Zitat Baek, J., Young-jj, B., Hableel, E., Al-Qutavri, M.: Making air traffic surveillance more reliable: a new authentication framework for automatic dependent sureillance-broadcast (ADS-B) based on online/offline identity-based signature. Secur. Commun. Netw. 8, 740–750 (2015)CrossRef Baek, J., Young-jj, B., Hableel, E., Al-Qutavri, M.: Making air traffic surveillance more reliable: a new authentication framework for automatic dependent sureillance-broadcast (ADS-B) based on online/offline identity-based signature. Secur. Commun. Netw. 8, 740–750 (2015)CrossRef
32.
Zurück zum Zitat Lauf, A.P., Peters, R.A., Robinson, W.H.: A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 8, 253–266 (2010)CrossRef Lauf, A.P., Peters, R.A., Robinson, W.H.: A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 8, 253–266 (2010)CrossRef
33.
Zurück zum Zitat Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46, 55 (2014)CrossRef Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46, 55 (2014)CrossRef
34.
Zurück zum Zitat Wesson, K.D., Humphreys, T.E., Evans, B.L.: Can cryptography secure next generation air traffic surveillance. IEEE Secur. Priv. Mag. (2014) Wesson, K.D., Humphreys, T.E., Evans, B.L.: Can cryptography secure next generation air traffic surveillance. IEEE Secur. Priv. Mag. (2014)
Metadaten
Titel
Manipulating the Five V’s in the Next Generation Air Transportation System
verfasst von
Dustin Mink
William Bradley Glisson
Ryan Benton
Kim-Kwang Raymond Choo
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-78816-6_19