ARINC 429 Cyber-vulnerabilities and Voltage Data in a Hardware-in-the-Loop Simulator

Connor Trask,Steve Movit,Justace Clutter,Rosene Clark,Mark Herrera,Kelly Tran
2024-08-30
Abstract:ARINC 429 is a ubiquitous data bus for civil avionics, enabling reliable communication between devices from disparate manufacturers. However, ARINC 429 lacks any form of encryption or authentication, making it an inherently insecure communication protocol and rendering any connected avionics vulnerable to a range of attacks. We constructed a hardware-in-the-loop simulator with ARINC 429 buses, explored these vulnerabilities, and identified their potential to deny, degrade, or disrupt aircraft capabilities. We performed a denial-of-service attack against a multi-function display via a compromised ARINC 429 bus using commercially available tools, which succeeded in disabling important navigational aids. This proven attack on physical avionics illustrates the risk inherent in ARINC 429 and the need for the ability to detect these attacks. One potential mitigation is an intrusion detection system (IDS) trained on data collected from the electrical properties of the physical bus. Although previous research has demonstrated the feasibility of an IDS on an ARINC 429 bus, no IDS has been trained on data generated by avionics hardware. To facilitate this, we recorded voltage traces and message history generated by avionics and adversarial devices on the ARINC 429 bus. To the best of our knowledge, this is the first publicly available collection of hardware-generated ARINC 429 signal data.
Cryptography and Security
What problem does this paper attempt to address?
The paper attempts to address the security vulnerabilities of the ARINC 429 data bus and its impact on avionics equipment. ARINC 429 is a data bus standard widely used in civil avionics equipment, but it lacks encryption or authentication mechanisms, leading to security risks. The paper explores these vulnerabilities by constructing a Hardware-in-the-Loop (HITL) simulator and demonstrates how these vulnerabilities can be exploited for attacks. Specifically, the main objectives of the paper include: 1. **Identifying and verifying ARINC 429 vulnerabilities**: Verifying the security vulnerabilities of ARINC 429 through actual experiments. 2. **Creating a publicly available ARINC 429 message dataset**: Generating real ARINC 429 signal data produced by avionics hardware, so that future research can develop Intrusion Detection Systems (IDS) based on these datasets. The paper demonstrates a Denial of Service attack by tampering with data on the ARINC 429 bus, causing the Multi-Function Display (MFD) to fail to display navigation information correctly. Additionally, the paper emphasizes the differences between data generated using actual hardware and simulated data, noting that the latter may not fully reflect the electrical characteristics of a real environment. Through this research, the paper aims to advance the development of ARINC 429 network security protection technologies.