Blockchain’s Newest Application Is Civil Aviation

Blockchain technology has a wide range of applications. Currently, it is tested as a means to ensure the privacy and security of aircraft flight data. NASA claims that blockchain networks and smart contracts can help mitigate some security issues.

Blockchain is a digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value. Smart contracts help exchange anything of value in a transparent, conflict-free way while avoiding the services of a middleman.

The US authorities have been mandated by the Federal Aviation Administration (FAA) to use a new surveillance system, Automatic Dependent Surveillance Broadcast (ADS-B), which will publicly broadcast aircrafts’ identity, position and other information.

That has raised security concerns, as the ADS-B system “does not include provisions for maintaining these same aircraft-privacy options, nor does it address the potential for spoofing, denial of service, and other well-documented risk factors,” claims Ronald Reisman, an aero-computer engineer at NASA Ames Research Center.

Civil aircraft companies would prefer to keep some data private, he writes, for example, to counter tracking executives as part of corporate espionage operations.

Military aircraft traffic data, meanwhile, is defined by the Department of Defense as “Information that, if disclosed, would reveal vulnerabilities in the DoD critical infrastructure and, if exploited, would likely result in the significant disruption, destruction, or damage of or to DoD operations, property, or facilities.”

The solution could be the Aviation Blockchain Infrastructure (ABI), based on Hyperledger Fabric and smart contracts, which allows control over what data is shared publicly or privately with authorized entities.

For instance, aircraft “state information,” such as altitude, indicated airspeed, heading, etc., could be kept secure via a private channel, while flight-plan information, such as aircraft type, origin, destination, filed route, etc., can be published on a public channel for access to approved members.

The solution offered is a “‘lightly permissioned’ blockchain framework to enable the ADS-B systems to meet or exceed the same levels of privacy and security currently provided by radar-based systems in theNational Airspace System.”

I-HLS:       CoinDesk: 

You Might Also Read

The Cyber Threat To Airports:

 

« Cyber Command’s Plan to ‘frustrate’ Hackers Is Working
Cyber Security Pros Are Feeling The Pressure »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

Lab 1

Lab 1

Lab 1 turns criminal data breaches and attacks into insights. Get alerts of data breaches or ransomware attack incidents as they happen.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.