Aviation Safety and Security

Topic Description

An intensive multi-national search for the Malaysian Airlines (MH370) aircraft that went missing somewhere over the Indian Ocean two years ago was unable to locate any first-hand evidence from plane’s on-board flight data recorders (also known as blackboxes). To mitigate similar problems in the future, an aviation proposal was made to analyse live streamed flight data using cloud computing; however, the technological readiness of satellite telecommunications bandwidth and scalability continue to be challenging [1]. To address these challenges, the research project aims to define a set of monitoring requirements that share some similar quality concerns around safety, security, and accuracy; to analyse actual data collected at the global scale for different live streaming measures; and to deploy technical solutions towards improving the aviation safety and security standard.

Skills Required:

The most important skills are those of scientific curiosity and engineering rigour. Specific skills are in the technical domains of Internet of Things, e.g. drones or autonomous vehicles; as well as time series and location data analytics. Having background in aviation industry would be desirable.

Background Reading:

[1] Y. Yu, “The aftermath of the missing flight MH370: what can engineers do?” Proceedings of the IEEE, vol. 103, no. 11, pp. 1948–1951, 2015.
[2] M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, “Locality-sensitive hashing scheme based on p-stable distributions,” in Proceedings of the Twentieth Annual Symposium on Computational Geometry, ser. SCG ’04, 2004, pp. 253–262.
[3] A. Aijaz, M. Dohler, A. H. Aghvami, V. Friderikos, and M. Frodigh, “Realizing the tactile internet: Haptic communications over next gener- ation 5g cellular networks,” CoRR, vol. abs/1510.02826, 2015.
[4] M. G. Kendall, Time-Series, 2nd ed. Charles Griffin, 1976.
[5] M. Yang, Y. Yu, A. K. Bandara, and B. Nuseibeh, “Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on, Sept 2014, pp. 45–52.
[6] M. Barhamgi, A. K. Bandara, Y. Yu, K. Belhajjame, and B. Nuseibeh, “Protecting privacy in the cloud: Current practices, future directions,” IEEE Computer, vol. 49, no. 2, pp. 68–72, 2016.
[7] Y. Wang, S. A. McIlraith, Y. Yu, and J. Mylopoulos, “Monitoring and diagnosing software requirements,” Autom. Softw. Eng., vol. 16, no. 1, pp. 3–35, 2009.
[8] M. Salifu, Y. Yu, A. K. Bandara, and B. Nuseibeh, “Analysing monitoring and switching problems for adaptive systems,” Journal of Systems and Software, vol. 85, no. 12, pp. 2829 – 2839, 2012.
[9] M. Jackson, “System behaviours and problem frames: Concepts, concerns and the role of formalisms in the development of cyber- physical systems,” in Dependable Software Systems Engineering, 2015, pp. 79–104.
[10] B. Nuseibeh, C. B. Haley, and C. Foster, “Securing the skies: In requirements we trust,” IEEE Computer, vol. 42, no. 9, pp. 64–72, 2009.
[11] B. Haley, C. Laney, D. Moffett, and B. Nuseibeh, “Using trust assumptions with security requirements,” Requir. Eng., vol. 11, no. 2, pp. 138–151, Feb. 2006.
[12] C. B. Haley, J. D. Moffett, R. Laney, and B. Nuseibeh, “A framework for security requirements engineering,” in Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems, ser. SESS ’06, 2006, pp. 35–42.
[13] J. Lockerbie, N. A. M. Maiden, J. Engmann, D. Randall, S. Jones, and D. Bush, “Exploring the impact of software requirements on system-wide goals: a method using satisfaction arguments and i* goal modelling,” Requir. Eng., vol. 17, no. 3, pp. 227–254, 2012.
[14] N. A. M. Maiden, J. Lockerbie, D. Randall, S. Jones, and D. Bush, “Using satisfaction arguments to enhance i* modelling of an air traffic management system,” in 15th IEEE International Requirements Engineering Conference, RE 2007, October 15-19th, 2007, New Delhi, India. IEEE Computer Society, 2007, pp. 49–52.
[15] G. Bergmann, F. Massacci, F. Paci, T. T. Tun, D. Varro ́, and Y. Yu, “SecMER: A tool to gain control of security requirements evolution,” in Towards a Service-Based Internet - 4th European Conference, Service- Wave 2011, Poznan, Poland, October 26-28, 2011. Proceedings, ser. Lecture Notes in Computer Science, W. Abramowicz, I. M. Llorente, M.Surridge, A.Zisman, and J. Vayssie`re,Eds.,vol.6994. Springer, 2011, pp. 321–322.
[16] Y. Yu, V. N. L. Franqueira, T. T. Tun, R. Wieringa, and B. Nuseibeh, “Automated analysis of security requirements through risk-based argumentation,” Journal of Systems and Software, vol. 106, pp. 102–116, 2015.
[17] M. de Gramatica, F. Massacci, W. Shim, A. Tedeschi, and J. Williams, “IT interdependence and the economic fairness of cybersecurity regulations for civil aviation,” IEEE Security & Privacy, vol. 13, no. 5, pp. 52–61, 2015.
[18] E. Letier, D. Stefan, and E. T. Barr, “Uncertainty, risk, and information value in software requirements and architecture,” in Proceedings of the 36th International Conference on Software Engineering, ser. ICSE 2014, 2014, pp. 883–894.
[19] G. G. Dagher, B. Bu ̈nz, J. Bonneau, J. Clark, and D. Boneh, “Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges,” in Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’15, 2015, pp. 720–731.
[20] Y. Liu, J. Cui, Z. Huang, H. Li, and H. T. Shen, “SK-LSH: an efficient index structure for approximate nearest neighbor search,” PVLDB, vol. 7, no. 9, pp. 745–756, 2014.

Report an error on this page