Difference between revisions of "Cyber Security Vulnerabilities in Avionics Networking"

From REU@MU
Jump to: navigation, search
(Created page with "'''Mentor:''' [http://www.marquette.edu/mscs/facstaff-perouli.shtml Dr. Debbie Perouli] '''Description:'''")
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
'''Mentor:'''  [http://www.marquette.edu/mscs/facstaff-perouli.shtml Dr. Debbie Perouli]
 
'''Mentor:'''  [http://www.marquette.edu/mscs/facstaff-perouli.shtml Dr. Debbie Perouli]
 
   
 
   
'''Description:'''
+
'''Description:''' The aircraft data networks in modern commercial aircrafts typically include four network domains: aircraft control, airline information services, passenger entertainment services and passenger-owned devices. As the network amenities offered to passengers and the use of Internet protocols (e.g. IP, full-duplex switched Ethernet) increase, the questions of safety and security need to be revisited. In this project, the student(s) will study network protocols used in aerospace and will learn about the cyber security threats specific to this industry. Student(s) will have the opportunity to use simulators and experiment with protocol interactions in order to highlight areas of higher cyber security concern.
 +
 
 +
'''Preferred qualifications:'''  Familiarity with Internet protocols is strongly recommended.

Latest revision as of 12:08, 2 February 2017

Mentor: Dr. Debbie Perouli

Description: The aircraft data networks in modern commercial aircrafts typically include four network domains: aircraft control, airline information services, passenger entertainment services and passenger-owned devices. As the network amenities offered to passengers and the use of Internet protocols (e.g. IP, full-duplex switched Ethernet) increase, the questions of safety and security need to be revisited. In this project, the student(s) will study network protocols used in aerospace and will learn about the cyber security threats specific to this industry. Student(s) will have the opportunity to use simulators and experiment with protocol interactions in order to highlight areas of higher cyber security concern.

Preferred qualifications: Familiarity with Internet protocols is strongly recommended.