• COVID-19
  • About Us
  • Contact Us
  • Events
  • Industries
  • Partners
  • Products & Services
  • Contribute
  • Webinars

Aerospace

  • Québec’s CloudOps Will Build Telesat LightSpeed’s Cloud Network
  • Myriota and Goanna Ag Team Up on IoT Agriculture Solutions
  • Fleet Picks Swissto12 to Deliver Additively Manufactured All-Metal Patch Antennas

Chemical

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Evonik deepens partnership with IBM to accelerate AI implementation
  • Achieving Plant Efficiency – the Digital Way

Cybersecurity

  • House Passes Eight Bipartisan Cyber, Homeland Security Bills
  • Biden Administration Targets Electric Utilities For Cybersecurity Protections
  • White House Attributes SolarWinds Hack To Russian Agency

Healthcare

  • CISA Services In High Demand Related To COVID Vaccine Response
  • AI tool detects COVID-19 by listening to patients’ coughs
  • Printing Wearable Sensors Directly onto Skin

Oil & Gas

  • Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
  • Cybersecurity: Continuous Vigilance Required
  • Repsol and Microsoft renew partnership developing AI-powered digital solutions

Power

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Self-Tuning Artificial Intelligence Improves Plant Efficiency and Flexibility
  • How to Put the Power Grid to Work to Prevent Wildfires

Transportation

  • Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
  • Trump Issues Cyber Security Plan For Maritime Transportation System
  • Sabic Launches New Compounds for Automotive Radar Sensors

Webinars

  • Anticipating the Unknowns: Accelerating Incident Response Without Losing Control
  • Industrial Endpoint Protection in Operational Technology
  • Known and Unknown: Putting a Stop to OT and IT Threats Before they Act

Sign up today for our free weekly e-letter

sign up
CONNECTING INNOVATIONS
WITH INSIGHT
SIGN UP
LOG IN
  • Aerospace
    Québec's CloudOps Will Build Telesat LightSpeed's Cloud Network
    Read story View all articles
  • Chemical
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Cybersecurity
    House Passes Eight Bipartisan Cyber, Homeland Security Bills
    Read story View all articles
  • Healthcare
    CISA Services In High Demand Related To COVID Vaccine Response
    Read story View all articles
  • Oil & Gas
    Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
    Read story View all articles
  • Power
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Transportation
    Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
    Read story View all articles
Aerospace
April 9 2020 9:53 am

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

F

Frank Wolfe

Wind River says the singular architecture of its Helix Virtualization Platform for running embedded systems is more secure from cyber attack than the alternative of running each embedded system independently. EASA and FAA cybersecurity mandates are likely to ramp up in the next two years. Photo: Wind River

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years, according to participants in an Avionics International Apr. 7 webinar, Clearing the Skies of Cybersecurity Vulnerabilities from the Ground Up, .

This year, EASA may adopt AMC 20-42 (NPA 2019-1) that will link information security guidelines to the high-level cyber standards of RTCA DO-326A or the EUROCAE ED-202 series.

Asked during the webinar how the avionics industry has thus far embraced airworthiness cybersecurity standards in RTCA DO-326A, 355 and 356, Alex Wilson, the director of aerospace and defense at Wind River, said that cybersecurity standards "have been adopted slowly, but I think we'll see a more rapid adoption throughout this year and the coming year."

"Currently, the standards are more voluntary or applied on a case by case basis on aircraft systems as they go into certification," he said. "These standards have been around in embryonic form since the [Boeing] 787 [Dreamliner] first went through its airworthiness process [a decade ago]."

Wilson predicted that "once we see those standards being mandated through rules and regulations, we'll start to see a massive adoption and a requirement of all new avionics systems to go through [these] standards."

Such mandates may spark, or re-ignite, the operational red teaming of aircraft cyber systems.

It has been unclear what the path forward is for cyber vulnerability testing of airliners in the United States after last month's decision by the Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA) to end the testing of a Boeing 757-200 at the Federal Aviation Administration (FAA) William J. Hughes Technical Center in Atlantic City.

Cyber vulnerabilities are not the exclusive domain of commercial airliners, but also are faced by military and business aircraft and future urban air mobility platforms and by diverse systems, such as onboard radar altimeters, Global Positioning System receivers, and military Identification Friend or Foe (IFF) systems.

Paul Hart, the chief technology officer at Curtiss-Wright Defense Solutions, said that combat search and rescue helicopters can have up to 60 computers onboard to run flight control processes, such as take-off and landing, and complex synthetic vision systems, while UAVs normally have less than 10 processors for flight control and detect and avoid systems, and airliners "typically have more than 100 computing platforms."

While e-Enabled aircraft provide flight and cost advantages for operators, they also come with cybersecurity vulnerabilities.

"The obvious question is, 'Isn't it just safer to separate from the Internet?'" Wilson asked at the start of his webinar presentation. "Why should we e-Enable and connect our aircraft? There's a whole list of reasons why we might want to do that. In this modern age, everyone is going through a process of digital transformation, moving to more intelligent platforms, and that gives us huge benefits in terms of operational efficiency, the ability to implement new advanced technologies, such as predictive maintenance so that we can reduce operational costs of our aircraft systems and allow us to update more efficiently the aircraft systems themselves, such as weather data on the aircraft and other data sources."

"That also allows us to increase the amount of revenue we're getting from our passenger systems and provide a better passenger experience while we fly," Wilson said. "There are huge challenges when we look at aviation systems that are very different to those we see in the IT world. Within the IT world we tend to see applications moving to the Cloud-based systems and moving very quickly with new updates daily and new features and functionality. The security standards within the IT world are certainly not well suited to the aviation world so we need to think about how we manage that. Also, within the IT world we tend to see systems being updated very rapidly compared to the update cycle that we see within our aircraft. So there are lots of challenges as we start to connect and provide that Internet connectivity."

These are the guidelines for cybersecurity associated with connected aircraft systems, which as of today, are not mandated by civil aviation authorities. Photo: Wind River

Indeed, while relatively isolated ACARS and VHF video data links and, more recently ADS-B (In) and ADS-B (Out) were the major features of aircraft electronics, aircraft wireless connectivity has opened up a range of vulnerabilities, Hart said. Instead of leather flight bags with paper charts, aircrews now can carry aboard Electronic Flight Bag (EFB) tablets and iPads that are able, through aircraft Wi-Fi, to obtain flight parameters to calculate take-off performance, for example. Maintenance engineers can also connect wirelessly to avionics systems of flight line aircraft through laptop Portable Maintenance Aids (PMA) for troubleshooting aircraft systems.

To update its cybersecurity policy as new threats emerge, Wind River uses the CIA Triad technique, which maps requirements against the three pillars of cybersecurity: Confidentiality, sustaining data the privacy of data being transmitted and stored, such as map data; Integrity--the accuracy of data during and after software updates, for example; and Availability for the uninterrupted flow of data, even in the face of common denial of service cyber attacks.

Global Connected Aircraft Podcast logo Want to hear more on aircraft connectivity applications? Check out the Global Connected Aircraft Podcast, where Avionics editor-in-chief Woodrow Bellamy III interviews airlines and industry influencers on how they're applying connectivity solutions.

Michael Mehlberg, vice president of marketing at Star Lab, a Wind River subsidiary, said that Wind River has adopted a cybersecurity first holistic approach through an examination of how cyber components interact with one another and a "defense in depth" with layers of cyber protection. Linux-based embedded systems, for example, while flexible, also have vulnerabilities, which Wind River mitigates through such means as operating system-level hardening, Linux LSM (Security-Enhanced Linux stacking), immutable deployment configurations, and multiple file systems, such as the authentication and/or encryption of applications, libraries, and data.

In addition, a secure boot process is a "massively important part of the cybersecurity process" to ensure no cyber intrusion happens while computer systems are at rest.

"The security policy and configuration really has to be a combination of products, product features, advanced security features, professional services to provide and mitigate a security assessment and add additional security where required and a combination of partnerships, for instance the Curtiss-Wright hardware with the Wind River software, in order to implement a secure system," Wilson said

 

 

Sign up today for our free weekly e-letter

sign up

Aerospace

Chemical

Cybersecurity

Healthcare

Oil & Gas

Power

Quiz

Transportation

Webinars

About Us

IIoT Connection delivers the latest news, trends, insights, events and research surrounding the dynamic and disruptive Industrial Internet of Things (IIoT) marketplace. Brought to you by the publisher of must-read publications Defense Daily, OR Manager, POWER and Chemical Engineering, as well as the conference producers of SATELLITE, Global Connected Aircraft Summit, Connected Plant Conference and ELECTRIC POWER, IIoT Connection is committed to providing the most comprehensive compilation of products and services dedicated to the Industrial Internet of Things. Key verticals with associated products and services include: aerospace, chemical, cybersecurity, healthcare, oil & gas, power, and transportation.


Advertise

  • Privacy Policy
© 2021 Access Intelligence, LLC - All Rights Reserved.
  • × UPS Partners with Wingcopter to Develop, Certify Drone Delivery Fleet
    Read story View all articles
  • × How Industrial Managers Can Identify and Prevent Failures in Facilities
    Read story View all articles
  • × Federal Agencies Partner To Improve Cyber Security Cooperation In Energy Sector
    Read story View all articles
  • × New service lines can create opportunities for ORs
    Read story View all articles
  • × Equinor and Shell to collaborate on digital solutions
    Read story View all articles
  • × Dobroflot to Manage Fuel Savings With IOT Solution By Orange Business Services
    Read story View all articles
  • × The Future of 5G & IoT Technologies in the Transportation Industry
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles