Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation

2021 ◽  
Author(s):  
Aharon David ◽  

A large international airport is a microcosm of the entire aviation sector, hosting hundreds of different types of aviation and non-aviation stakeholders: aircraft, passengers, airlines, travel agencies, air traffic management and control, retails shops, runway systems, building management, ground transportation, and much more. Their associated information technology and cyber physical systems—along with an exponentially resultant number of interconnections—present a massive cybersecurity challenge. Unlike the physical security challenge, which was treated in earnest throughout the last decades, cyber-attacks on airports keep coming, but most airport lack essential means to confront such cyber-attacks. These missing means are not technical tools, but rather holistic regulatory directives, technical and process standards, guides, and best practices for airports cybersecurity—even airport cybersecurity concepts and basic definitions are missing in certain cases. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity. This last item includes the gaps and challenges in the existing guides, best-practices, standards, and regulation pertaining to airport cybersecurity. Finally, practical solution-seeking processes are proposed, as well as some specific potential frameworks and solutions.

Author(s):  
Feifei Xin ◽  
Xiaobo Wang ◽  
Chongjing Sun

In recent years, conflicts between crossing pedestrians and right-turning vehicles have become more severe at intersections in China, where right-turning vehicles are usually not controlled by traffic signals. This study proposes a quantitative method for evaluating the conflict risk between pedestrians and right-turning vehicles at intersections based on micro-level behavioral data obtained from video detection. A typical intersection in Shanghai was selected as the study site. In total, 670 min of video were recorded during the peak hours from 7:30 a.m. to 9:30 p.m on one day. After processing the video information, vehicle and pedestrian tracking data were obtained, including the velocity, acceleration, deceleration, time, and location coordinates. Based on these data, several conflict indicators were proposed and these indicators were extracted automatically using MATLAB to identify pedestrian–right-turning vehicle conflicts and to determine the severity of the conflicts identified. This process identified 93 examples of such conflicts. The conflict risks were quantitatively classified using the K-means fuzzy clustering method and all of the conflicts were assigned to five grades. The characteristics of the conflict distribution and the severity of different types of conflict were also analyzed, which showed that conflicts on different areas on the crosswalk differed in their severity. Based on the conclusions, practical traffic management and control measures are proposed to reduce the risk on pedestrian crossings.


Author(s):  
Lee A. Cysouw ◽  
Douglas C. Osburn ◽  
Nader M. Rabadi

Remote communications to field devices for data monitoring and controls has greatly reduced operating costs, reduced downtime, and helped to optimize our industry. With the ever growing threat of cyber-attacks, the need for securing that data is becoming a more common topic of discussion. Whether collecting SCADA or Measurement data from the field, doing remote configuration, or even sitting dormant, it is important to keep the line of communication to your devices secure. This presentation will discuss potential threats and examples of cyber-attacks. It will cover industry standards, types of cyber security, and the importance and best practices for securing data for Measurement and/or SCADA and control systems.


Author(s):  
Володимир Якович Певнев ◽  
Володимир Володимирович Торяник ◽  
Вячеслав Сергійович Харченко

The subject of this study is the radio frequency cyber vulnerability of information and control interaction technology in the wireless smart systems (WSS). WSS is the cyber-physical systems, that operate within the OSI model. The specificity and specialization of these systems are determined by radio technologies of the physical layer. For example, the Internet of Things (IoT, including medical IoMT), the Internet of Drones (IoD), systems for aviation monitoring ADS-B and traffic management ATM, and, in the future, the Internet of Everything (IoE) - all are types of WSS. The aim is to analyze the radio frequency parameters of information and control interaction in the WSS to identify possible radio frequency cyber vulnerabilities in the WSS. Objectives: summarize and systematize the physical and functional parameters of wireless technologies in the ISM (Industrial Scientific & Medical Band) and SRD (Short range devices) ranges, which are significant from the WSS radiofrequency cyber vulnerability perspective, including navigation technologies; analyze trends and methods of successful cyber attacks on the WSS; carry out expert assessments of potential WSSs cyber vulnerabilities depending on their architecture and application area. The methods used: analysis of trends in known radiofrequency incidents and expert assessments of the cyber vulnerability of the WSS information and control interaction channels. The following results were obtained: 12 actual WSS radio technologies were analyzed. 6 types of possible radio frequency cyber attacks on the WSS were typified. The expert assessment of the probability of exploiting vulnerabilities by ranges, radio technologies, and attack type was made. The special danger of high-tech targeted APT attacks, as well as the high potential radio vulnerability of cyber-physical systems, was shown. The cyber vulnerability of ADS-B aircraft systems was especially noted. Conclusions. The scientific novelty of the results obtained is as follows: a trend of APT attacks cost reduction and an increase in the probability of their implementation through the new capabilities of SDR technology (Software Defined Radio) were revealed. The possibility of a controlled SDR compromising of the security parameters of WSS channels in any radio range was shown. A promising direction of research was proposed - SDR-penetration testing of WSS.


Aviation ◽  
2014 ◽  
Vol 18 (4) ◽  
pp. 185-192 ◽  
Author(s):  
Volodymyr Kharchenko ◽  
Valeriy Chepizhenko ◽  
Svetlana Pavlova ◽  
Wang Bo

A new concept of the synthesis of a synergetic regulator for the control of difficult multidimensional aircraft in polyconflict conditions is offered in the article. The basic idea of control synthesis is the use of self-organization properties of real physical systems for the formation of algorithms for the synergetic regulator operation. This approach allows solving the problem of the high dimensionality of the regulator for aircraft in polyconflict conditions and provides aircraft control in real time. The synergetic approach offered by the authors allows minimising the expenditure of energy for conflict avoidance between aircraft and supports the guaranteed safety level of their motion.


2021 ◽  
Vol 5 (3) ◽  
pp. 1-25
Author(s):  
Craig Bakker ◽  
Arnab Bhattacharya ◽  
Samrat Chatterjee ◽  
Draguna L. Vrabie

Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable to deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy attacks such as Stuxnet can be described as Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames and APTs to develop hypergame-based defender strategies that are robust to deception and do not rely on attack detection. These strategies provide provable bounds—and provably optimal bounds—on the attacker payoff. Strategies based on Bayesian priors do not provide such bounds. We then numerically demonstrate our approach on a building control subsystem and discuss next steps in extending this approach toward an operational capability.


Sign in / Sign up

Export Citation Format

Share Document