Abstract
The U.S. Next Generation Air Transportation System (NextGen) is designed to increase the capacity, safety and efficiency of the air traffic control via the integration of past experiences and advances in technology. However, the system is expected to greatly increase the amount and types of data generated as well as the knowledge to be managed. Additionally, as with all new technology, U.S. NextGen opens the specter of the potential impacts created by cyberattacks. Given this, it appears logical to view the U.S. NextGen system from the lens of Big Data. This study evaluates the U.S. NextGen system using the five differentiated qualitative characteristics of big data: Volume, Velocity, Variety, Veracity and Value. The results indicate that U.S. NextGen system has several big data challenges that must be addressed in order to obtain its maximal potential.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
U.S. Department of Transportation: Fact Sheet - FAA Forecast Fact Sheet-Fiscal Years 2016–2036, 2017 (2016)
Gillen, D., Morrison, W.G.: Aviation security: costing, pricing, finance and performance. J. Air Transp. Manage. 48, 1–12 (2015)
Committee on Appropriations: FY2017 Homeland Security Appropriations Bill Cleared for Committee Debate, 2017 (2016)
Kaspersen, A.: Four threats to aviation security – and four responses, 2017 (2016)
BBC News: Brussels explosions: what we know about airport and metro attacks, 2017 (2016)
BBC News: MH17 Ukraine plane crash: what we know, 2017 (2016)
AirlineReporter: Updated: Malaysia Airlines Flight 370 Has Likely Crashed But Where? 2017 (2014)
United States Government Accountability Office: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen, 2017 (2015)
Strohmeier, M., Martinovic, I.: On passive data link layer fingerprinting of aircraft transponders. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, pp. 1–9. ACM, Denver (2015)
Costin, A.: Ghost is in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black Hat USA (2012)
Strohmeier, M., Schafer, M., Lenders, V., Martinovic, I.: Realities and challenges of nextgen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52, 111–118 (2014)
Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404–409 (2013)
Berman, K., Glisson, W.B., Glisson, L.M.: Investigating the impact of global positioning system (GPS) evidence in court cases. In: Hawaii International Conference on System Sciences (HICSS-48). IEEE, Kauai (2015)
McMillan, J., Glisson, W.B., Bromby, M.: Investigating the increase in mobile phone evidence in criminal activities. In: Hawaii International Conference on System Sciences (HICSS-46). IEEE, Wailea (2013)
Mink, D., Yasinsac, A., Choo, K.-K.R., Glisson, W.B.: Next generation aircraft architecture and digital forensic. In: Americas Conference on Information Systems (AMCIS). Americas Conference on Information Systems, San Diego (2016)
Moallemi, M., Castro-Peña, C.A., Towhidnejad, M., Abraham, B.: Information security in the aircraft access to system wide information management infrastructure. In: 2016 Integrated Communications Navigation and Surveillance (ICNS), pp. 1A3-1–1A3-7 (2016)
He, D., Kumar, N., Choo, K.K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans. Inf. Forens. Secur. 12, 454–464 (2017)
Varga, M., Polgár, Z.A., Hedeşiu, H.: ADS-B based real-time air traffic monitoring system. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 215–219 (2015)
Boci, E., Thistlethwaite, S.: A novel big data architecture in support of ADS-B data analytic. In: 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), pp. C1-1–C1-8 (2015)
Li, W., Kamal, P.: Integrated aviation security for defense-in-depth of next generation air transportation system. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 136–142 (2011)
Samuelson, K., Valovage, E., Hall, D.: Enhanced ADS-B research. In: IEEE Aerospace Conference, pp. 1–7 (2006)
Robinson, R.V., Sampigethaya, K., Li, M., Lintelman, S., Poovendran, R., Oheimb, D.V.: Secure network-enabled commercial airplane operations: it support infrastructure challenges. In: First CEAS European Air Space Conference, pp. 1–10 (2007)
Kacem, T., Wijesekera, D., Costa, P.: Integrity and authenticity of ADS-B broadcasts. In: IEEE Aerospace Conference, pp. 1–8 (2015)
Tassone, C.F.R., Martini, B., Choo, K.-K.R.: Visualizing digital forensic datasets: a proof of concept. J. Forensic Sci. 62, 1197–1204 (2017)
Oates, B.J.: Researching Information Systems and Computing (2006)
Dong, X.L., Srivastava, D.: Big data integration. In: IEEE 29th International Conference on Data Engineering (ICDE), pp. 1245–1248 (2013)
U.S. Department of Transportation’s Bureau of Transportation Statistics: Transportation Statistics Annual Report 2016 (2016)
Marsh, R., Ogaard, K.: Mining heterogeneous ADS-B data sets for probabilistic models of pilot behavior. In: IEEE International Conference on Data Mining Workshops, pp. 606–612 (2010)
Finke, C., Butts, J., Mills, R.: ADS-B encryption: confidentiality in the friendly skies. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1–4. ACM, Oak Ridge (2013)
Chen, T.-C.: An authenticated encrption scheme for automatic dependent surveillance-broadcast. IEEE Commun. Mag. (2012)
Baek, J., Young-jj, B., Hableel, E., Al-Qutavri, M.: Making air traffic surveillance more reliable: a new authentication framework for automatic dependent sureillance-broadcast (ADS-B) based on online/offline identity-based signature. Secur. Commun. Netw. 8, 740–750 (2015)
Lauf, A.P., Peters, R.A., Robinson, W.H.: A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 8, 253–266 (2010)
Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46, 55 (2014)
Wesson, K.D., Humphreys, T.E., Evans, B.L.: Can cryptography secure next generation air traffic surveillance. IEEE Secur. Priv. Mag. (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Mink, D., Glisson, W.B., Benton, R., Choo, KK.R. (2018). Manipulating the Five V’s in the Next Generation Air Transportation System. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-78816-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-78816-6_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78815-9
Online ISBN: 978-3-319-78816-6
eBook Packages: Computer ScienceComputer Science (R0)