Refine Your Search

Topic

Search Results

Journal Article

A Centrally Managed Identity-Anonymized CAN Communication System*

2018-05-16
Abstract Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.
Journal Article

A Study on Secured Unmanned Aerial Vehicle-Based Fog Computing Networks

2023-11-03
Abstract With the recent advancement in technologies, researchers worldwide have a growing interest in unmanned aerial vehicles (UAVs). The last few years have been significant in terms of its global awareness, adoption, and applications across industries. In UAV-aided wireless networks, there are some limitations in terms of power consumption, data computation, data processing, endurance, and security. So, the idea of UAVs and Edge or Fog computing together deals with the limitations and provides intelligence at the network’s edge, which makes it more valuable to use in emergency applications. Fog computing distributes data in a decentralized way and blockchain also works on the principle of decentralization. Blockchain, as a decentralized database, uses cryptographic methods including hash functions and public key encryption to secure the user information. It is a prominent solution to secure the user’s information in blocks and maintain privacy.
Article

AIA predicts flying air taxis, supersonic air travel, and space industry for 2050

2019-03-15
In the “What’s Next for Aerospace and Defense: A Vision for 2050” study, AIA, New York City-based McKinsey & Company, and other industry partners reveal a comprehensive 30-year, Industry 4.0 forecast of air travel and spaceflight based on improvements in automation and digitization, next-generation materials, alternative energy sources and storage, and increased data throughput.
Article

Abaco’s new avionics platforms transfer data up to 40Gbps with Thunderbolt 3 connectivity

2019-04-02
Abaco Systems Inc. is launching a new family of avionics devices for test and simulation, development, and dataloading that feature Thunderbolt 3 interfaces. The new portable, high-speed, low-latency avionics devices – RCEI-830A-TB and QPM-1553-TB – are designed for a broad range of avionics applications and include Thunderbolt 3-to-PMC/XMC interfacing with ARINC 429 and MIL-STD-1553 protocols.
Article

Addressing configuration controls in an era of multiple security frameworks

2019-07-04
 Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing information technology (IT) systems. The goal is to reduce risk levels and prevent or mitigate cyberattacks. To accomplish this task, security frameworks typically provide a series of documented, agreed upon, and understood policies, procedures, and processes necessary to secure the confidentiality, integrity, and availability of information systems and data.
Video

Advancing Aircraft Cyber Security - Potential New Architectures and Technologies

2012-03-16
Cyber security in the aviation industry, especially in relation to onboard aircraft systems, presents unique challenges in its implementation and management. The cyber threat model is constantly evolving and will continually present new and different challenges to the aircraft operator in responding to new cyber threats without either invoking a lengthy software update and re-certification process or limiting aircraft-to-ground communications to the threatened system or systems. This presentation discusses a number of system architectural options and developing technologies that could be considered to enhance the aircraft cyber protection and defensive capabilities of onboard systems as well as to minimize the effort associated with certification/re-certification. Some of these limit the aircraft?s vulnerabilities or in cyber terms, its ?threat surface?.
Magazine

Aerospace & Defense Technology: December 2022

2022-12-01
Why are Aerospace & Defense Companies Embracing Additive Manufacturing? Simplifying Power Design with Modular Architectures The Role of DevSecOps in Modern Edge Systems Making Machines Curious Designing Multi-Channel Microwave Radio Systems Using Optical Interconnects Solving Military Satellite, Radar and 5G Communications Challenges with GaN-on-SiC MMIC Power Amplifiers Advanced Airborne Defensive Laser for Incorporation on Strike Fighter Aircraft A technical and operational analysis of an airborne "hard-kill" Ytterbium fiber laser-based anti-missile system for use on strike fighters. Additive Manufacturing Utilizing a Novel In-Line Mixing System for Design of Functionally Graded Ceramic Composites Exploring the development of a direct ink writing system with multimaterial and in-line mixing capabilities for printing inks composed of high solids-loaded ceramic particulate suspensions.
Magazine

Aerospace & Defense Technology: May 2024

2024-05-09
Explaining MOSA from the Team that Led the Army Aviation Mission Computing Environment Task Order What's the Best DC Motor for Your Commercial Aerospace Application? Aerospace Production: Overcoming Challenges in Composite Machining Understanding the Limits of Artificial Intelligence for Predictive Maintenance Pushing the Limits: Engineering Advanced RF Interconnects to Meet the Challenges of Hypersonic Missile Development Expanding Possibilities for Superconducting Qubits With Niobium Researchers Help Robots Navigate Efficiently in Uncertain Environments A new algorithm reduces travel time by identifying shortcuts a robot could take on the way to its destination.
Magazine

Aerospace & Defense Technology: October 2015

2015-10-01
Countering cybersecurity threats against unmanned vehicle systems Cranfield University researchers have developed a monitoring system whose purpose is to monitor mission profile implementation at both high level mission execution and at lower level software code operation to tackle specific threats of malicious code and possible spurious commands received over a vehicle's data links.
Article

Air mobility innovations take center stage at Aerospace Systems and Technology Conference 2018

2018-11-06
Hundreds of aerospace executives, engineers, scientists, and academics are gathering in London this week for Aerospace Systems and Technology Conference (ASTC) 2018 from SAE International in Warrendale, Pennsylvania. Discussions during the three-day industry event center on the theme of innovating air mobility. Aerospace thought leaders are at ASTC discussing current challenges, the latest enabling technologies, and future opportunities, including those related to urban air mobility (UAM) and supersonic aircraft.
Event

Attend - Innovations in Mobility: Aerospace Digital Summit

2024-05-15
Innovations in Mobility: Aerospace Digital Summitaerospace mobility leaders convene leverage cutting-edge technology, design, develop safety measures, integrate current regulations, suggest future policies, expand markets, diversify revenue streams.
Article

Automation streamlines accreditation to speed aerospace and defense technology deployment

2018-12-07
Automated software tools are eliminating weeks, if not months, from the Risk Management Framework (RMF) accreditation process by virtually eliminating the time of the initial hardening while also providing the required documentation. By doing so, technology integrators can significantly reduce the time to build, test, and deploy new technologies in Security Technical Implementation Guide (STIG)-compliant environments.
X