13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

This report states that the primary issue impact<strong>in</strong>g network airborne system safety is how to<br />

extend exist<strong>in</strong>g ARP 4574, ARP 4761, DO-178B, and DO-254 assurance guidance processes<br />

<strong>in</strong>to networked systems and environments <strong>in</strong> a mathematically viable manner. This study<br />

recommends that these processes can be extended <strong>in</strong>to arbitrarily vast network environments <strong>in</strong> a<br />

mathematically viable manner by us<strong>in</strong>g the Biba Integrity Model framework. This report maps<br />

current DO-178B and ARP 4754 processes <strong>in</strong>to the Biba Integrity Model framework us<strong>in</strong>g wellestablished<br />

system security eng<strong>in</strong>eer<strong>in</strong>g processes to def<strong>in</strong>e airborne safety requirements. It<br />

applies best current <strong>in</strong>formation assurance techniques upon those airborne safety requirements to<br />

create a generic airborne network architecture.<br />

S<strong>in</strong>ce the Biba Integrity Model is an <strong>in</strong>tegrity framework, it carries with<strong>in</strong> itself a natural<br />

mechanism for relat<strong>in</strong>g safety and security concepts <strong>in</strong> terms of their respective <strong>in</strong>tegrity<br />

attributes. Nevertheless, this study recommends that the model be implemented solely with<strong>in</strong> the<br />

context of exist<strong>in</strong>g <strong>FAA</strong> safety processes. This results <strong>in</strong> airborne network systems be<strong>in</strong>g<br />

organized <strong>in</strong>to networks that operate at specific safety levels (the DO-178B software levels).<br />

There are fortuitous secondary effects from us<strong>in</strong>g the Biba Integrity Model to extend current<br />

<strong>FAA</strong> processes <strong>in</strong>to networked environments that stem from it be<strong>in</strong>g the direct analog of the<br />

Bell-LaPadula Confidentiality Model. The Bell-LaPadula Confidentiality Model forms the<br />

framework for confidentiality with<strong>in</strong> U.S. Department of Defense (DoD) <strong>in</strong>formation process<strong>in</strong>g.<br />

Consequently, the application of the Biba Integrity Model to airborne system assurance<br />

processes results <strong>in</strong> an airborne network architecture that remarkably resembles the emerg<strong>in</strong>g<br />

DoD network architecture (the global <strong>in</strong>formation grid (GIG)), despite their very different<br />

underly<strong>in</strong>g goals. Consequently, the generic airborne network architecture identified by this<br />

study greatly resembles the DoD’s GIG architecture. While military technologies could be used<br />

to implement the airborne network architecture, this study recommends the use of civilian<br />

Internet protocols deployed as a virtual private network. In addition, the similarities between the<br />

Biba Integrity Model and the Bell-LaPadula Confidentiality Models may result <strong>in</strong> <strong>in</strong>creased<br />

synergies between the DoD and <strong>FAA</strong> certification processes.<br />

Deploy<strong>in</strong>g airborne systems <strong>in</strong>to networked environments means that the <strong>FAA</strong> system safety<br />

assessment (ARP 4761), system development (ARP 4754), software assurance (DO-178B), and<br />

complex electronic hardware assurance (DO-254) processes need to be extended to address and<br />

mitigate network threats. For example, although security is primarily a systems concept<br />

<strong>in</strong>volv<strong>in</strong>g system issues (e.g., ARP 4754), the Biba Integrity Model relies upon the networked<br />

items hav<strong>in</strong>g <strong>in</strong>tegrity attributes that function at a known assurance level (i.e., specific DO-178B<br />

software levels). This means that the processes for develop<strong>in</strong>g those items for network<br />

environments should be extended to address network attack risks. The concept of highassurance<br />

software <strong>in</strong> networked environments should therefore mean that items and systems<br />

will behave <strong>in</strong> the same manner before, dur<strong>in</strong>g, and after network attacks; i.e., be immune to<br />

potential network-based threats. Exploits <strong>in</strong> network environments leverage latent software<br />

blemishes so that software items are subject to misbehavior, corruption, or compromise, possibly<br />

<strong>in</strong>clud<strong>in</strong>g<br />

xiv

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!