<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Simulation modelling of the transmission system of the telemetric information on the status of the on-board aircraft status</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Guzairov</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">USATU -Ufa State Aviation University</orgName>
								<address>
									<addrLine>Karla Marksa street 12</addrLine>
									<postCode>450000</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Frid</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">USATU -Ufa State Aviation University</orgName>
								<address>
									<addrLine>Karla Marksa street 12</addrLine>
									<postCode>450000</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Vulfin</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">USATU -Ufa State Aviation University</orgName>
								<address>
									<addrLine>Karla Marksa street 12</addrLine>
									<postCode>450000</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Berkholts</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">USATU -Ufa State Aviation University</orgName>
								<address>
									<addrLine>Karla Marksa street 12</addrLine>
									<postCode>450000</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department">IV International Conference on &quot;Information Technology and Nanotechnology&quot; (ITNT</orgName>
								<address>
									<postCode>2018</postCode>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Simulation modelling of the transmission system of the telemetric information on the status of the on-board aircraft status</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">7BF12741171162E369BA1497A60F5C5E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Modern aviation systems are complex hierarchical computing systems, coupled with a powerful periphery (digital board). The flight is performed with constant communication with ground control points and requires exchange of large amounts of data. The reliability of the systems providing flight can be violated due to equipment failures, human factor and external unauthorized exposure. The paper discusses the issues of guaranteeing the reliability of telemetry information transmission systems on the state of the aircraft and its systems based on artificial intelligence methods in terms of ensuring information security. The structure of the imitation stand is proposed to test the system for transmitting telemetric information about the state of on board airborne systems to the ground. The purpose of such system is to improve the efficiency of modelling and analysis of the system's security.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">The first section in your paper</head><p>Provision of dependability telemetric data transmission systems (TMI) is a primary goal of ensuring the efficient functioning of the aircraft.</p><p>The application of technologies for monitoring the status of critical elements of the aircraft's design in real time will allow a full (operational and intelligent) analysis of the operational capability of the aircraft systems (LA), crew conditions and control of its actions in the ground control center.</p><p>For example, the Bombardier jetliner was demonstrated at the Paris air show. It has a motor that is equipped with 5000 sensors, which generate up to 10 GB of data per second. A single twin-engine aircraft with an average 12-hour flight time can create up to 844 TB of data <ref type="bibr">[1]</ref>. The arising malfunctions and failures of the on-board equipment can be diagnosed on the basis of the processed telemetric information. This allows experts of ground technical services to prepare for operational repair even before landing the aircraft. Accumulated and processed TMI will allow specialists to provide reasonable support for decision-making in the event of technical failure of aircraft units or modules.</p><p>The possibility of transmitting TMIs on the actual state of individual modules to the manufacturer of aviation equipment units will make it possible to increase the operational efficiency of the aircraft in its normal state and in the event of failures, as well as when investigating incidents. For example, a study of ground-to-board communication systems showed that the ACARS system, despite its versatility and ubiquitous use, is vulnerable, and if it is hacked with ADS-B, an attacker can gain access to the flight control system, download flight plans and detailed commands <ref type="bibr">[2]</ref>.</p><p>The purpose of this study is to increase the security of the TMI transmission system on the status of individual elements of on-board systems in an automatic mode based on the use of modern technologies of protection and processing of TMI using an imitation stand.</p><p>To achieve this goal, the following tasks are formulated: 1. Develop a structural scheme for the collection, transmission and reception of telemetric information on the status of individual elements of the aircraft systems of the aircraft;</p><p>2. Develop the architecture of the system for analyzing the security of the TMI transmission system on the status of individual elements of the aircraft system.</p><p>Formatting Structural scheme for the collection, transmission and reception of TMI on the status of individual elements of the aircraft system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Structural scheme for the collection, transmission and reception of TMI on the status of individual elements of the aircraft system</head><p>Automated information system (AIS) of ground maintenance services is a set of software and hardware needed to receive, store and process information on technological parameters of complex technical device (CTD). A typical block diagram of the existing TMI processing system of the manufacturer is shown in Figure <ref type="figure" target="#fig_0">1</ref>. An analysis of existing approaches to solve the problem of ensuring the reliability of such systems is considered in the work <ref type="bibr">[3]</ref>. AIS solves the main tasks associated with receiving information about the state of a complex technical device. Data is planned to be received in three different ways (figure <ref type="figure" target="#fig_1">2</ref>):</p><p>1. Directly from the system. STD is a component of this system; 2. By reading the event log from the CTD module sensors. The status of the modules is read and stored during the previous period of operation.</p><p>3. Entering events into the database manually. The operator processes the information and enters information through the WEB application. Data is entered into the database via web-application in the second and third cases. WEBapplication is an insulating layer between external networks and internal structure of AIS, since access from an external network is one of the most vulnerable places of the system. The structural scheme of the collection and transmission of TMI is presented in Figure <ref type="figure" target="#fig_2">3</ref>. In the work of the authors [3], the problem of providing secure access to the existing database containing critical information about the parameters of the life cycle of complex technical products (CTD) using the example of gas turbine engine control system was considered.</p><p>Thus, increasing the security of access to a database containing critical information about an exploited product is based on the development of a secure WEB application architecture. It serves as an isolating layer for external AIS clients, which allows for the provision of the ability to transmit and analyze at ground service stations and to provide remote access to the required data. Prevention of vulnerabilities in the WEB-application is carried out by implementing measures to develop secure software, established by GOST R ISO / IEC 12207 <ref type="bibr">[4]</ref>.</p><p>Modeling security threats and identifying vectors of possible attacks, as well as their analysis, allowed to formulate countermeasures for each of the vectors at different architectural levels of the WEB application.</p><p>The growth in the volumes of telemetric information forces the aviation industry to consider new approaches to collecting and analyzing a large amount of data on the condition of aircraft nodes and elements. The concept of an industrial Internet of things is developing actively (IIoT). This is a deployed network consisting of a large number of devices equipped with a set of sensors that exchange data with each other through low-power and short wireless connections. The first step is to collect data from the sensors. One of the most promising solutions is a protocol with low power consumption and low transmission radius IEEE 802. <ref type="bibr">15.4 IEEE 802.15.4e [5]</ref>. A short range is sufficient to transmit data within the ground service station. <ref type="bibr">The IEEE 802.15.4 and IEEE 802.15</ref>.4e protocols and their architecture layers are subject to IETF standards <ref type="bibr">[6]</ref>.</p><p>The question of analyzing the security of the system for collecting, transmitting and receiving telemetric information on the status of individual elements of aircraft systems during data transmission through the first two channels remains an open question. The violation of the information security of the TMI collection and transmission system under consideration can be caused by a variety of different reasons: vulnerabilities in operating systems and server and client applications; incorrect configuration of hardware and software; access control settings errors, and so on.</p><p>External and internal violators can implement various strategies to attack the system. The attacker can use combinations of available vulnerabilities and network configuration and security policy (PB) deficiencies. These strategies can be designed to access a database that contains critical information about STI. Strategies can also include multi-step chains of attacking actions to implement security threats. This arises the task of verifying the provision of the necessary level of security The level of security of the system is determined by a set of parameters for the configuration of the data transmission network, security policy and protection mechanisms.</p><p>The initial data for analyzing the security of the TMI collection and transmission system are its specifications and security policies. The task of developing the architecture of the security analysis system (SAS) is due to the high complexity of the TMI collection and transmission system. This increases the number of vulnerabilities and potential errors of the software and hardware components. The SAS of the TMI collection and transmission system should detect errors in the transmission network configuration, possible routes of attacking actions of various categories of violators (for implementing various security threats), identify critical network resources and ensure the selection of adequate security policy threats. The core of the CAS are algorithms for assessing the level of security of the system, it is based on the construction of possible actions of violators in the form of attack graphs. The properties of the attack graph are checked and the system security metrics are calculated <ref type="bibr">[7]</ref>.</p><p>The system for analyzing the security of the transmission of telemetric information includes the implementation of a set of models:</p><p>• behavior model of an attacker;</p><p>• simulation of the graph of attacking actions aimed at the implementation of information security threats taking into account attacker's qualification;</p><p>• vulnerability model of the system; • calculation of security metrics system and assessment of the overall level of security. The security analysis system is a software package implemented as a hierarchical set of clientserver applications. AIS enterprise interaction is carried out by means of a Web application with remote TMI transmission modules: a secure channel, single-board microcomputers with a set of required wired and wireless network interfaces, intermediate switching equipment, a client and server computer. Input data for security analysis are:</p><p>• specification of the configuration of the information system for data collection and transmission of TMI;</p><p>• specification of the planned security policy;</p><p>• hardware and software vulnerabilities;</p><p>• model of the intruder;</p><p>• requirements to the security of the information system. The output of the CAS are:</p><p>• identified vulnerabilities of the system;</p><p>• graphs of possible attacks; • security metrics;</p><p>• evaluation of the overall level of security of the system and its components. The obtained results provide the development of well-founded recommendations on elimination of identified bottlenecks and strengthening of the system's security.</p><p>The simulation stand is a software implementation of the system for analyzing the protection of the transmission of telemetric information on the state of airborne systems. The generalized architecture of the proposed CAS is shown in Figure <ref type="figure" target="#fig_3">4</ref>.</p><p>The module for configuring the security analysis model allows the security specialist to manage the operation of all system components, specify the input parameters of the analysis process, the requirements for the level of security, and review security analysis reports and receive recommendations for enhancing the security of the TMI transmission system. The management and administration module provides access to external vulnerability databases and configuration settings for other modules (modeling of IS nodes, simulating an attacker and its actions, as well as updating the DB and the Knowledge Base (KB)). The module for forming the internal representation of the analyzed network and the security policy converts the data about the analyzed network and the implemented security policy into an internal representation.</p><p>The security systems and security policies introduced in the SAS should describe the components of the protected system (network) with the necessary degree of detail -the software used (in the form of software product names and versions) must be specified The data warehouse consists of the following databases and knowledge bases:</p><p>(1) knowledge base on the structure and configuration of the TMI transmission network and the implemented security policy;</p><p>(2) an attack database;</p><p>The knowledge base group consists of four bases:</p><p>(1) knowledge base on the configuration of the analyzed system;</p><p>(2) knowledge base on the security policy (SP) implemented in the information system;</p><p>(3) knowledge base of the intruder about the configuration of the analyzed network;</p><p>(4) knowledge base of the offender on the network security policy implemented in the network.</p><p>The network configuration database and the security policy database contain information about the architecture and specific parameters of the network and the rules that describe its operation. The action database group consists of the following bases:</p><p>(1) DB of actions using vulnerabilities. It is built on the basis of an external database of vulnerabilities.</p><p>(2) The intelligence database contains actions aimed at remote retrieval of information about the host or network.</p><p>The security requirements database contains predefined sets of values of security metrics, each of which corresponds to the requirements for systems of a certain security class <ref type="bibr">[8]</ref>.</p><p>The database update module and the knowledge base downloads open vulnerability databases [9,10] and updates the database of attacking actions.</p><p>The attack graph module simulates possible actions of the intruder in the analyzed network, using information about available actions of various types (attacking, reconnaissance), network onfiguration and the used security policy.</p><p>The module for the implementation of the intruder's model provides a definition of the initial position of the offender, the level of knowledge and skills, the primary knowledge of the analyzed computer network. The level of knowledge and skills determines the set of actions used by the offender.</p><p>The security analysis module forms a set of composite objects of the attack graph. It also calculates security metrics related to these objects, estimates the overall level of security of the computer network. Algorithms for the intellectual analysis of large volumes of transmitted TMI using Big Data technologies use preprocessing methods with highlighting useful information about the hidden actions of the attacker. The selection in the sequence of values of the observed parameters of TMI, features, repetitive processes, hidden anomalies and patterns in automatic mode underlies the procedure for detecting an attack of an attacker and replenishing the corresponding BR. Technologies of intellectual analysis of large volumes of accumulated data have proved themselves in the tasks of technical diagnostics of complex control objects <ref type="bibr">[11,</ref><ref type="bibr">12]</ref> and detection of fraudulent activities in information systems. The results of the analysis are processed in the advisory module based on the application of methods and algorithms for data mining. The analysis results are compared with the requirements determined by the information security specialist, and recommendations are made to improve the overall level of security of computer networks.</p><p>Ensuring the reliability of systems for transmitting telemetric information about the state of aircraft using artificial intelligence methods.</p><p>Assurance (dependability) allows to solve complex problems of ensuring trouble-free operation, fault tolerance, availability, security, serviceability, observability of the TMI transmission system from the aircraft. The SAS being developed allows one to estimate one of the parameters of the overall integral index of the system's reliability. It is showed in figure 5. Therefore, it is necessary to build a hierarchy of models that allow to comprehensively assess various aspects of the TMI transmission system and develop a methodology for assessing the overall integral index of the system's overall security.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Structural diagram of the TMI processing system.</figDesc><graphic coords="2,191.95,326.11,225.65,155.89" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. Methods of obtaining TMI.</figDesc><graphic coords="2,197.38,595.86,214.80,138.79" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. Structural scheme for the collection, transmission and reception of telemetric information on the status of individual elements of the aircraft system.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. Architectures of the TMI transmission security analysis system on the status of individual elements of the aircraft systems.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 .</head><label>5</label><figDesc>Figure 5. Architectures of the TMI transmission security system on the status of the individual elements of the aircraft systems.</figDesc><graphic coords="6,322.31,458.25,90.29,210.68" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This article is supported by RFBR grant № 17-07-00351.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Conclusion</head><p>The structure of an imitation stand for testing a system for transmitting telemetric information about the state of airborne systems to a ground station for processing telemetric information and control is proposed to improve the efficiency of modeling and analysis of system security. A block diagram is proposed for the collection, transmission and reception of telemetric information on the status of individual elements of the aircraft systems of the aircraft. The architecture of the security analysis system of the TMI transmission system on the status of individual elements of the aircraft system is developed. To assess the overall integral index of the system's overall security, it is necessary to build a hierarchy of models that allow for a comprehensive assessment of various aspects of the TMI transmission system and develop a methodology </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">References</head></div>			</div>
			<div type="references">

				<listBibl/>
			</div>
		</back>
	</text>
</TEI>
