Refine Your Search


Search Results

Technical Paper

A Blockchain-Backed Database for Qualified Parts

Certain standard parts in the aerospace industry require qualification as a prerequisite to manufacturing, signifying that the manufacturer’s capacity to produce parts consistent with the performance specifications has been audited by a neutral third-party auditor, key customer, and/or group of customers. In at least some cases, a certifying authority provides manufacturers with certificates of qualification which they can then present to prospective customers, and/or lists qualified suppliers in a Qualified Parts List or Qualified Supplier List available from that qualification authority. If this list is in an infrequently updated and/or inconsistently styled format as might be found in a print or PDF document, potential customers wishing to integrate qualification information into their supplier tracking systems must use a potentially error-prone manual process that could lead to later reliance on out-of-date or even forged data.


This document defines an Aircraft Data Interface Function (ADIF) developed for aircraft installations that incorporate network components based on commercially available technologies. This document defines a set of protocols and services for the exchange of aircraft avionics data across aircraft networks. A common set of services that may be used to access specific avionics parameters are described. The ADIF may be implemented as a generic network service, or it may be implemented as a dedicated service within an ARINC 759 Aircraft Interface Devices (AID) such as those used with an Electronic Flight Bag (EFB). Supplement 8 includes improvements in the Aviation Data Broadcast Protocol (ADBP), adds support for the Media Independent Aircraft Messaging (MIAM) protocol, and contains data security enhancements. It also includes notification and deprecation of the Generic Aircraft Parameter Service (GAPS) protocol that will be deleted in a future supplement.

Aerospace & Defense Technology: October 2015

Countering cybersecurity threats against unmanned vehicle systems Cranfield University researchers have developed a monitoring system whose purpose is to monitor mission profile implementation at both high level mission execution and at lower level software code operation to tackle specific threats of malicious code and possible spurious commands received over a vehicle's data links.

Aerospace & Defense Technology: October 2020

The Role of Autonomous Unmanned Ground Vehicle Technologies in Defense Applications Information Warfare - Staying Protected at the Edge Designing Connectivity Solutions for an Electric Aircraft Future Redesigning the Systems Engineering Process to Speed Development of E-Propulsion Aircraft Four RF Technology Trends You Need to Know for Satellite Communication Device Design Manufacturer Reduces Risk and Improves Quality of Military Radar Receivers Instrumentation for Fabrication and Testing of High-Speed Single-Rotor and Compound-Rotor Systems Precision data acquisition is required to generate a comprehensive set of measurements of the blade surface pressures, pitch link loads, hub loads, rotor wakes and performance of high-speed single-rotor and compound-rotor systems to support the development of next-generation rotorcraft.

Artificial Intelligence in Aeronautical Systems: Statement of Concerns

This document reviews current aerospace software, hardware, and system development standards used in the certification/approval process of safety-critical airborne and ground-based systems, and assesses whether these standards are compatible with a typical Artificial Intelligence (AI) and Machine Learning (ML) development approach. The document then outlines what is required to produce a standard that provides the necessary accommodation to support integration of ML-enabled sub-systems into safety-critical airborne and ground-based systems, and details next steps in the production of such a standard.

Attend - Innovations in Mobility: Aerospace Digital Summit

Innovations in Mobility: Aerospace Digital Summitaerospace mobility leaders convene leverage cutting-edge technology, design, develop safety measures, integrate current regulations, suggest future policies, expand markets, diversify revenue streams.

Autonomous Technologies: Applications That Matter

Over the years, the DARPA Challenges in the United States have galvanized interest in autonomous cars, making them a real possibility in the mind of the public, but autonomous and unmanned vehicles have been increasingly employed in many roles on land, in the water, and in the air. Military applications have received a great deal of attention, with weaponized unmanned aircraft (drones) being the most prominent. However, unmanned vehicles with varying degrees of autonomy already have many civilian applications. Some of these are quite familiar (such as the Roomba autonomous vacuum cleaner), while others remain largely out of the public eye (such as autonomous farm equipment). Additional applications and more capable vehicles are rapidly coming to the markets in the years ahead. This book examines a number of economically important areas in which unmanned and autonomous vehicles, also understood here as autonomous technologies, are already used or soon will be.


The purpose of this document is to facilitate an understanding of aircraft information security and to develop aircraft information security operational concepts. This common understanding is important since a number of subcommittees and working groups within the aeronautical industry are considering aircraft information security. This document also provides an aircraft information security process framework relating to airline operational needs that, when implemented by an airline and its suppliers, will enable the safe and secure dispatch of the aircraft in a timely manner. This framework facilitates development of cost-effective aircraft information security and provides a common language for understanding security needs.

Commercial Aviation Cyber Security: Current State and Essential Reading

In the next decade, commercial aviation will see Next Generation ATM (NextGEN), Single European Skies ATM Research (SESAR), and others utilizing Internet- based air-to-ground communication links for advanced “air traffic control” (ATC) communications. Commercial Aviation Cyber Security: Current State and Essential Reading highlights some of the major issues the industry must confront if the vision of a new, advanced air traffic management is to come to fruition. This will require standardization work to identify key components with built-in cyber security that will guide prototype testing, functionality, and prioritizing implementation efforts to solve the roadblocks to global interoperability. The ten technical papers selected for Commercial Aviation Cyber Security: Current State and Essential Reading span the last decade’s work in commercial aviation cyber security, and aircraft cyber technologies.

Commercial Aviation and Cyber Security: A Critical Intersection

As cyber attacks become more frequent at all levels, the commercial aviation industry is gearing up to respond accordingly. Commercial Aviation and Cyber Security: A Critical Intersection is a timely contribution to those responsible for keeping aircraft and infrastructure safe. It covers areas of vital interest such as aircraft communications, next-gen air transportation systems, the impact of the Internet of Things (IoT), regulations, the efforts being developed by the Federal Aviation Administration (FAA), and other regulatory bodies. The book also collects important information on the best practices already adopted by other industries such as utilities, defense and the National Highway Traffic Safety Administration in the US. It equally addresses risk management, response plans to cyber attacks, managing supply chains and their cyber- security flaws, personnel training, and the sharing of information among industry players.

Determination of Cost Benefits from Implementing a Blockchain Solution

This SAE Aerospace Recommended Practice (ARP) provides insights on how to perform a Cost Benefit Analysis (CBA) to determine the Return on Investment (ROI) that would result from implementing a blockchain solution to a new or an existing business process. The word “blockchain” refers to a method of documenting when data transactions occur using a distributed ledger with desired immutable qualities. The scope of the current document is on enterprise blockchain which gives the benefit of standardized cryptography, legal enforceability and regulatory compliance. The document analyzes the complexity involved with this technology, lists some of the different approaches that can be used for conducting a CBA, and differentiates its analysis depending on whether the application uses a public or a private distributed network.

Electronic Transactions for Aerospace Systems: An Overview

This SAE Aerospace Recommended Practice (ARP) offers an overview of the many key processes that are being transformed as the aerospace industry is rapidly digitalizing. The G-31 Electronic Transactions in Aerospace committee has been established to develop standards related to these processes. This report, also known as the “cornerstone” document for the committee, is a comprehensive look at processes associated with commercial aviation. Because of universal convergence of these technologies, the technologies described here are applicable to other domains as well.

Energy in the 21st Century (2nd Edition)

This book, in its second edition, examines the energy sources that play a vital role in society today, as well as those that may be the primary energy sources of tomorrow. From our reliance on fossil fuels to the quest for energy independence, and the environmental issues that follow each decision, this book delves into the most prominent energy issues of our time. Armed with this information, the reader can think critically about the direction they want this world to take. Contents: Brief History of Energy Consumption Fossil Energy - Coal Fossil Energy - Oil and Gas Peak Oil Nuclear Energy Renewable Energy - Solar Energy Renewable Energy - Wind Energy Renewable Energy - Energy from Water Renewable Energy - Bioenergy and Synfuels Energy Carrier, Energy Storage and Hybrid Energy Systems Electricity Generation and Distribution Energy Economics Future Issues - Geopolitics of Energy Future Issues - Energy Forecasts


This document will address measures pertaining to and directly associated with the maintainability and reliability of FSTDs throughout their entire life cycle, from initial specification and design to de-commissioning. Although the primary emphasis of this document is on full flight simulators (with motion and visual systems), it should be applicable in part or total to all FSTDs.


This document sets forth guidance for life-cycle management of public/private (i.e., asymmetric) keys that are used to secure interactions among systems.

How to Manage the Perfect Factory or How AS6500 Can Lead To Everlasting Happiness

Why AS6500? Where did it come from? Why does it exist? Those are easy questions to answer. It came from the inspiration of angels and it exists to make your life, and your factory, more perfect. That's why, when you open the standard, you can still hear the faint echoes of the singing of angels. Actually, experts were gathered from across the country, both from the Defense Department and from industry to create the new document. They toiled away until the perfect product emerged from the fruit of their labors: Aerospace Standard AS6500, "Manufacturing Management Program," published in November 2014. How to Manage the Perfect Factory combines education and instruction with fun, laughter and motivation. The book gently pokes fun at the people and organizational barriers that the Manufacturing function must overcome to make those obstacles seem more surmountable while providing key information on implementing AS6500.

Implementation Guide for Data Management

The federal government and industry have moved to concurrent acquisition and development processes using integrated process teams (IPTs). These processes are supported by timely, accurate, cross functional access to data within an integrated data environment (IDE) enabled by advances in information technology (IT). Since the advent of acquisition reform in 1994, Data Management (DM) practices have evolved from being directed by a prescriptive set of standards and procedures to use of the guidance in a principles-based standard -- ANSI/EIA 859.

GEIA Handbook 859 provides implementation guidance for ANSI/EIA 859, with discussions of applications of the standard's principles, tools, examples, and case studies. Handbook 859 is organized according to the lifecycle of data management and covers activities from the pre-RFP stage through records disposition.

Technical Paper

Information Security Risk Management of Vehicles

The results of this work is allowed to identify a number of cybersecurity threats of the automated security-critical automotive systems, which reduces the efficiency of operation, road safety and system safety. ...According to the evaluating criterion of board electronics, the presence of poorly-protected communication channels, the 75% of the researched modern vehicles do not meet the minimum requirements of cybersecurity due to the danger of external blocking of vital systems. The revealed vulnerabilities of the security-critical automotive systems lead to the necessity of developing methods for mechanical and electronic protection of the modern vehicle. ...The law of normal distribution of the mid-points of the expert evaluation of the cyber-security of a modern vehicle has been determined. Based on the system approach, ranking of the main cybersecurity treats is performed.