Live Blackboxes: Requirements for tracking and verifying aircraft in motion

作者: Yijun Yu , Mu Yang , Bashar Nuseibeh

DOI: 10.2514/6.2017-0884

关键词:

摘要: The Malaysian Airlines (MH370) aircraft went missing somewhere over the Indian Ocean two years ago. After intensive search since then, international team still has not been able to locate any first-hand evidence from plane's flight data recorders (also known as ‘blackboxes'). To mitigate similar problems, a proposal made analyse live streamed using cloud computing; however, satellite communication is constrained by bandwidth and scalability challenges. In this paper, we propose five requirements for addressing these These frame class of monitoring problems that share some accuracy concerns around safety security. We evaluate assess readiness proposed technology - which call “live blackboxes" actual global scale performing an analysis different streaming intervals. Preprocessing with locality-sensitive hashing function, it results in reduction required 4.75 times. Therefore, track verify all civilian motion, requirement could be satisfied communications. While paper focuses on particular problem air traffic management, speculate continuous critical systems.

参考文章(18)
Yingfan Liu, Jiangtao Cui, Zi Huang, Hui Li, Heng Tao Shen, SK-LSH Proceedings of the VLDB Endowment. ,vol. 7, pp. 745- 756 ,(2014) , 10.14778/2732939.2732947
Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu, SeCMER: A Tool to Gain Control of Security Requirements Evolution Towards a Service-Based Internet. pp. 321- 322 ,(2011) , 10.1007/978-3-642-24755-2_35
Martina De Gramatica, Fabio Massacci, Woohyun Shim, Alessandra Tedeschi, Julian Williams, IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation ieee symposium on security and privacy. ,vol. 13, pp. 52- 61 ,(2015) , 10.1109/MSP.2015.98
James Lockerbie, Neil Arthur McDougall Maiden, Jorgen Engmann, Debbie Randall, Sean Jones, David Bush, Exploring the impact of software requirements on system-wide goals: a method using satisfaction arguments and i* goal modelling Requirements Engineering. ,vol. 17, pp. 227- 254 ,(2012) , 10.1007/S00766-011-0138-8
Emmanuel Letier, David Stefan, Earl T. Barr, Uncertainty, risk, and information value in software requirements and architecture international conference on software engineering. pp. 883- 894 ,(2014) , 10.1145/2568225.2568239
Mu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh, Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit trust security and privacy in computing and communications. pp. 45- 52 ,(2014) , 10.1109/TRUSTCOM.2014.10
Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh, Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges computer and communications security. pp. 720- 731 ,(2015) , 10.1145/2810103.2813674
Yiqiao Wang, Sheila A. McIlraith, Yijun Yu, John Mylopoulos, Monitoring and diagnosing software requirements automated software engineering. ,vol. 16, pp. 3- 35 ,(2009) , 10.1007/S10515-008-0042-8
Bashar Nuseibeh, Charles B. Haley, Craig Foster, Securing the Skies: In Requirements We Trust IEEE Computer. ,vol. 42, pp. 64- 72 ,(2009) , 10.1109/MC.2009.299