ABSTRACT

Format ......................................................................................................... 70 4.2.3.2 ARINC Specification 620 and the ACARS Ground-Ground

Message Format ......................................................................................... 73 4.2.4 Conclusion ................................................................................................................ 76

4.3 ACARS Datalink Message Security Protection Method ................................................ 76 4.3.1 Security Threats of ACARS Datalink ................................................................... 76

4.3.1.1 Data Leakage .............................................................................................77 4.3.1.2 Data Deceiving .......................................................................................... 78 4.3.1.3 Entity Masquerade .................................................................................... 78 4.3.1.4 Denial of Service ....................................................................................... 78

4.3.2 ACARS Message Security ....................................................................................... 79 4.3.3 ACARS Information Security Architecture .........................................................80