Abstract:
A vehicle network system is configured to detect unauthorized intrusions by a passenger-owned device, and to identify the passenger-owned device based at least in part on stored information representative of network communications. The vehicle network system can be further configured to determine a position of the intruding passenger-owned device within a passenger area of the vehicle and to obtain a name and/or camera image of a passenger associated with the device. The position of the intruding device can be identified based at least in part on communications between the intruding device and one or more network-access devices distributed throughout the passenger area.
Abstract:
An aircraft includes an aircraft network having nodes and links and a sandbox network in communication with the aircraft network. The sandbox network simulates the aircraft network and includes sandbox nodes corresponding to the nodes of the aircraft network, a first set of sandbox links corresponding to the links of the aircraft network, and a second set of sandbox links providing communication between sandbox nodes not in communication via the first set of sandbox links. Computer executable instructions, when executed, perform the steps of: generating network traffic over the sandbox network such that the sandbox network models a behavior of the aircraft network; identifying a suspicious activity on the aircraft network; routing the suspicious activity from the aircraft network to the sandbox network; and analyzing the suspicious activity as the suspicious activity traverses through the sandbox network.
Abstract:
A system includes a transmitting line replaceable unit (TLRU) configured to receive messages including instructions for avionics receiving line replaceable units (RLRUs). The system further includes a memory configured to store validation data including a set of expected messages. A monitor is further included and is configured to monitor messages received at the TLRU and further configured to determine whether received messages are valid based on at least a portion of the set of expected messages stored in the memory. A plurality of RLRUs are further included and configured to receive message from the TLRU and to execute the instructions included in the received messages.
Abstract:
A system for evaluating a cyber-attack on an aircraft may include a display associated with the aircraft, a sensor system configured to generate sensor data for a pilot, and a data processing system configured to: (1) generate simulation data, (2) generate a flight simulation from the simulation data, (3) simulate the cyber-attack on at least one aircraft system during the flight simulation, (4) generate virtual flight data during the flight simulation, and (5) present the sensor data and the virtual flight data.
Abstract:
Provided are methods and systems for multiband wireless data transmission between aircraft and ground systems. The transmission uses different wavelength ranges, each wavelength range corresponding to a different data domain and establishing a different communication channel. This wavelength differentiation provides physical separation between different data domains and, as a result, improves data security. Furthermore, a single broadband antenna is used on the exterior of the aircraft for transmitting data sets from different data domains. The single antenna configuration reduces drag and weight and improves structural integrity of the aircraft in comparison to multi-antenna configurations. Different aircraft communication modules, which are connected to different aircraft systems, handle different data domains and operate at different wavelength ranges. These modules are connected to the same antenna using a multiplexer. This connection may be controlled using gate devices and may be conditioned on verification of communication channel availability, security status, and other factors.
Abstract:
A testing device includes a first interface device configured to enable communication with a first component of a vehicle and a second interface device configured to enable communication with a second component of the vehicle. The testing device includes a test module storage configured to store one or more test modules and also includes a user interface and a test controller. The test controller is responsive to the user interface to select a test module from the test module storage and to cause the first interface device to communicate first test data to the first component of the vehicle and to cause the second interface device to communicate second test data to the second component of the vehicle to perform a vulnerability test associated with the selected test module.
Abstract:
Provided are methods and systems for multiband wireless data transmission between aircraft and ground systems. The transmission uses different wavelength ranges, each wavelength range corresponding to a different data domain and establishing a different communication channel. This wavelength differentiation provides physical separation between different data domains and, as a result, improves data security. Furthermore, a single broadband antenna is used on the exterior of the aircraft for transmitting data sets from different data domains. The single antenna configuration reduces drag and weight and improves structural integrity of the aircraft in comparison to multi-antenna configurations. Different aircraft communication modules, which are connected to different aircraft systems, handle different data domains and operate at different wavelength ranges. These modules are connected to the same antenna using a multiplexer. This connection may be controlled using gate devices and may be conditioned on verification of communication channel availability, security status, and other factors.
Abstract:
The present invention generally relates to systems and methods for encrypting data. The disclosed techniques can include tracking a plurality of flight parameter values for a plurality of flight parameters of an aircraft, generating a first cryptographic key from the plurality of flight parameter values, encrypting plaintext using the first cryptographic key to generate a first ciphertext, and sending, from a sender to a receiver, a message comprising the first ciphertext.
Abstract:
An inline ARINC data authenticity inspection module, method and computer program product are provided. In the context of a method, ARINC data that is transmitted via an ARINC bus is received into a buffer partition. The method also includes inspecting the ARINC data from the buffer partition within an inspection partition. The method further includes determining, as a result of having inspected the ARINC data within the inspection partition, whether the ARINC data is authentic. In an instance in which the ARINC data is determined to not be authentic, the method logs receipt of the ARINC data that is determined to not be authentic. However, in an instance in which the ARINC data is determined to be authentic, the method permits data corresponding to the ARINC data to be transmitted to an intended destination.
Abstract:
This disclosure relates to updating information in devices of remote systems over a network. A method includes receiving, via a first switch, a first selection. The method also includes activating, based on the first selection, a data partition in a storage device corresponding to the first device. The method further includes deactivating based on the first selection, data partitions in the storage device corresponding to non-selected devices. Additionally, the method includes storing information in the data partition corresponding to the first device. Moreover, the method includes receiving, via a second switch, a second selection. The method also includes determining that the first selection matches the second selection. The method further includes retrieving, based on the determining, the information from said activated data partition. Additionally, the method includes providing the retrieved information to a first device that corresponds to the first selection and the second selection.