A Holistic Approach to Ensuring Safety and Cybersecurity in the Use of Intelligent Technologies in Air Transport
DOI:
https://doi.org/10.18372/1990-5548.75.17563Keywords:
air transport, artificial intelligence, machine learning, decision-making systems, cybersecurity, frameworkAbstract
The article is devoted to the study and analysis of the problems associated with the use of intelligent technologies in air transport security and cybersecurity issues. Possible dangers that may arise when using autonomous systems, including autonomous aircraft, are considered. The technical measures that can be taken to prevent these dangers, including the development of new methods of cybersecurity and protection against hacker attacks, are analyzed. The problem of ensuring security in air transport associated with the introduction of new technologies and automated systems is investigated. The risks associated with this process are described, such as possible aircraft accidents, data storage problems, and passenger safety issues. Technical measures that can be taken to ensure safety in air transport, including the development of new technologies and diagnostic methods that can detect possible problems before they become serious, are considered. Practical solutions to these problems are proposed, including the development of new security and cybersecurity systems that can be used in air transport. The technical measures that can be taken to ensure the safety and efficiency of the use of intelligent technologies in air transport are described. It is established that the developed simulation model can serve as an effective tool for managing the processes of aircraft ground handling at the airport, as well as allow predicting the results of such processes and developing algorithms for the rational allocation of resources, considering the functioning of the system in different modes. To ensure the efficient functioning of the aircraft ground handling system, it is proposed to implement technical measures to improve cybersecurity and ensure the system's resilience to possible cyberattacks.
References
International Air Transport Association. (2021). Global Aviation Data Management Report 2021. https://www.iata.org/contentassets/c81222d96c9a4e0bb4ff6ced0126f0bb/iata-annual-review-2021.pdf
A. Patterson, Information Systems – Using Information, Learning and Teaching Scotland, 2005.
European Union Aviation Safety Agency. (2021). European Aviation Safety Plan 2021–2025. https://www.easa.europa.eu/en/document-library/general-publications/annual-safety-review-2021
National Institute of Standards and Technology. (2017). Framework for Improving Critical Infrastructure Cybersecurity. https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf
A. Biryukov, D. Khovratovich, & I. Nikolić, (2016). Distinguisher and related-key attack on the full AES-256. In Advances in Cryptology – CRYPTO 2016 (pp. 1–20). Springer.
A. K. Jain, A. Ross & K. Nandakumar, (2016). Introduction to biometrics. Springer.
ISO/IEC 27001 Information technology – Security techniques – Information security management systems. (2013). https://www.iso.org/standard/54534.html
European Union Agency for Cybersecurity. (2021). Good practices for securing smart airports. https://www.enisa.europa.eu/publications/securing-smart-airports
National Cyber Security Centre. (2018). Penetration Testing: Technical Guide. https://www.ncsc.gov.uk/guidance/penetration-testing
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).