IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 3 - Issue 7, July 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Review On Aircraft Security Monitoring System

[Full Text]

 

AUTHOR(S)

Adarsh S S, Kavitha K V

 

KEYWORDS

Keywords: ADN, SVSS, AAP, NKMU, Key Agreement, AFDX etc.

 

ABSTRACT

ABSTRACT: Passengers in aircraft must need high security. The incidents like aircraft hijacking or crash happens. To avoid these events, some security measures can be taken. Such type of three security measures are studied and compared here and among them, an efficient aircraft security method is identified. In first method, which is one of the old security measures, the Air Traffic Management (ATM) system is used to ensure security. Here the aircraft network is constantly monitored and checked for hacking is done. It is done through Network Activity Monitoring Tool, which is an Intrusion Detection System. So this method can prevent the attacks from hackers and virtual hijacking. In the second method, the implementation of a Smart Video Surveillance System (SVSS) is used. The video system is installed at the cockpit of the aircraft. In the video system, face recognition system is established. If anyone other than pilot entered in to the room, the system send emergency signals to the ground station. The SVSS architecture is also much simple than the previous method. The final method is the latest and one of the best aircraft security monitoring system. This system is invented and used in China. The security of aircraft and key agreement scheme is joined together to attain more security. The key agreement scheme authenticates the aircraft and airport software, so that to ensure either side is secure. The aircraft side makes high security by applying biometric systems so that only the pilots can fly the aircraft. Also there is secret video surveillance of passengers to ensure no passenger is a hijacker. This reviewwill provide a basic idea about aircraft security and it will be helpful for the future researches.

 

REFERENCES

[1] N. THANTBRY and R. PENDSE, “Aviation data net-works: Security issues and network architecture,” IEEE A&E SYSTEMS MAGAZINE, JUNE 2005.

[2] P. TINGEY and P.PARKINSON, “Secure networking for avionics systems,” DEFENSE PROCUREMENT ANALYSIS, 2003.

[3] M. S. A. N. THANTBRY and R. PENDSE, “Security, internet connectivity and aircraft data networks,” in IEEE CONFERENCE PAPER, 2005.

[4] A. S. K. N. NAGARAJA THANTHRY, INDIRA P EM-MADI and R. PENDSE, “Svss: An intelligent video surveillance system for aircraft,” in IEEE CONFERENCE PAPER, 2007.

[5] D. Y. Y. GUANG DAI and Y. T. QIAN, “Face recognition using kernel-step discriminant analysis algorithm,” PATTERN RECOGNITION, vol. 40, pp. 229–243, 2007.

[6] M. G. KRESIMIR DELAC and S. GRGIC, “Independent comparative study of pca, ica and lda on the feret data set,” UNSKA 3/XII, 2006.

[7] R. C. W. ZHAO and J. PHILLIPS, “Face recognition in still and video images: A literature survey,” ACM COMPUTING SURVEYS, vol. 35, pp. 399–458, DECEMBER 2003.

[8] Q. L. DAHAI DU and Z. LI, “A key agreement scheme for avionics communications security,” in IEEE CON-FERENCE PAPER, 2012.

[9] Z. C. SHENGBAO WANG and K.-K. R. CHOO, “Provably secure identity-based authenticated key agreement protocols without random oracles,” CRYPTOGRAPHY ePRINT ARCHIVE, pp. 1–16, 2006.