Abstract:
Systems and methods of a security architecture for a connected aircraft are disclosed. In at least one embodiment, an avionics server comprises a plurality of device ports, wherein each of the plurality of device ports is coupled to a respective one of a plurality of device network interface cards and dedicated to a respective one of a plurality of avionics domains which corresponds to the respective device network interface card. Further, at least one processing device is configured to identify one or more signals from a respective user received at one or more of the plurality of device ports and to verify whether the user has access to the respective avionics domains that are dedicated to the one or more device ports over which the one or more signals are received.
Abstract:
A system, configured to mount on an ownship vehicle, includes a transceiver configured to receive positioning signals and receive surveillance signals including surveillance data from a second vehicle and processing circuitry configured to determine a location of the ownship vehicle based on the positioning signals received by the transceiver and determine expected characteristics of the surveillance signals based on the surveillance data. The processing circuitry is further configured to compare the expected characteristics and actual characteristics of the surveillance signals received from the second vehicle and determine that the surveillance signals include a discrepancy indicative of false positioning signals in response to comparing the expected characteristics and the actual characteristics. The processing circuitry is configured to output an alert signal indicating the false positioning signals in response to determining that the surveillance signals include a discrepancy.
Abstract:
Embodiments described herein provide for a system for verifying integrity of files uplinked to a remote vehicle. The system is configured to receive a first message authentication code (MAC) for the uplinked file, a first acknowledgement MAC for the MAC, and a first cyclic redundancy check (CRC) for the first MAC and the acknowledgement MAC. The system is also configured to compute a second MAC from the uplinked file, a second acknowledgement MAC from the second MAC and a second CRC from the second MAC and second acknowledgement MAC. Integrity of the uplinked file is verified by comparing the first CRC with the second CRC. If integrity of the uplinked file is confirmed, the uplinked file is accepted. If integrity of the uplinked file is not confirmed, the uplinked file is rejected.
Abstract:
A ground remote control system for an aircraft includes a security pairing device configured to establish a first secure communication link and protocol between a remote control device and a ground remote control system controller; and establish a second secure communication link and protocol, using the first communication link and protocol between the remote control device and the ground remote control system controller. The ground remote control system controller is configured to receive drive command signals, brake command signals, steering command signals, and power command signals, from the remote control device and generate the electronic drive commands, the electronic brake commands, the electronic steering commands, and the electronic power commands.
Abstract:
Systems and methods for secure communications over broadband datalinks are provided. In certain implementations, a system for providing secure communications through a communication link includes a first communication unit that includes a processing unit that is configured to execute code that causes the first communication unit to verify messages with a firewall as they are received by the first communication unit; remove encapsulation data that encapsulates a message received from a second communication unit; check a digital signature appended to the message received from a second communication unit through a non-secure communication link; perform an integrity check on the message; and when the message is verified through the digital signature and the integrity check, process the message; wherein removal of the encapsulation data and implementation of the firewall is in a first partition and performance of the integrity check and verification of the digital signature is in a second partition.
Abstract:
A system, configured to mount on an ownship vehicle, includes a transceiver configured to receive positioning signals and receive surveillance signals including surveillance data from a second vehicle and processing circuitry configured to determine a location of the ownship vehicle based on the positioning signals received by the transceiver and determine expected characteristics of the surveillance signals based on the surveillance data. The processing circuitry is further configured to compare the expected characteristics and actual characteristics of the surveillance signals received from the second vehicle and determine that the surveillance signals include a discrepancy indicative of false positioning signals in response to comparing the expected characteristics and the actual characteristics. The processing circuitry is configured to output an alert signal indicating the false positioning signals in response to determining that the surveillance signals include a discrepancy.
Abstract:
In some examples, a system, configured to mount on an ownship vehicle, includes a transceiver configured to receive positioning signals and receive surveillance signals including surveillance data from a second vehicle and processing circuitry configured to determine a location of the ownship vehicle based on the positioning signals received by the transceiver and determine expected characteristics of the surveillance signals based on the surveillance data. In some examples, the processing circuitry is further configured to compare the expected characteristics and actual characteristics of the surveillance signals received from the second vehicle and determine that the surveillance signals include a discrepancy indicative of false positioning signals in response to comparing the expected characteristics and the actual characteristics. In some examples, the processing circuitry is configured to output an alert signal indicating the false positioning signals in response to determining that the surveillance signals include a discrepancy.
Abstract:
Systems and methods for secure communications over broadband datalinks are provided. In certain implementations, a system for providing secure communications through a communication link includes a first communication unit that includes a processing unit that is configured to execute code that causes the first communication unit to verify messages with a firewall as they are received by the first communication unit; remove encapsulation data that encapsulates a message received from a second communication unit; check a digital signature appended to the message received from a second communication unit through a non-secure communication link; perform an integrity check on the message; and when the message is verified through the digital signature and the integrity check, process the message; wherein removal of the encapsulation data and implementation of the firewall is in a first partition and performance of the integrity check and verification of the digital signature is in a second partition.
Abstract:
Embodiments described herein provide for a system for verifying integrity of files uplinked to a remote vehicle. The system is configured to receive a first message authentication code (MAC) for the uplinked file, a first acknowledgement MAC for the MAC, and a first cyclic redundancy check (CRC) for the first MAC and the acknowledgement MAC. The system is also configured to compute a second MAC from the uplinked file, a second acknowledgement MAC from the second MAC and a second CRC from the second MAC and second acknowledgement MAC. Integrity of the uplinked file is verified by comparing the first CRC with the second CRC. If integrity of the uplinked file is confirmed, the uplinked file is accepted. If integrity of the uplinked file is not confirmed, the uplinked file is rejected.
Abstract:
In some examples, a system, configured to mount on an ownship vehicle, includes a transceiver configured to receive positioning signals and receive surveillance signals including surveillance data from a second vehicle and processing circuitry configured to determine a location of the ownship vehicle based on the positioning signals received by the transceiver and determine expected characteristics of the surveillance signals based on the surveillance data. In some examples, the processing circuitry is further configured to compare the expected characteristics and actual characteristics of the surveillance signals received from the second vehicle and determine that the surveillance signals include a discrepancy indicative of false positioning signals in response to comparing the expected characteristics and the actual characteristics. In some examples, the processing circuitry is configured to output an alert signal indicating the false positioning signals in response to determining that the surveillance signals include a discrepancy.