Skip to main content

Cybersecurity Threats Analysis for Airports

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 931)


In today’s society, the cyber-security subject raises a lot of uncomfortable questions and gives no alternative to cyber-attacks. Thus, for a better understanding of the problem, people should know that such attacks are deliberate malicious acts undertaken via cyber-space to compromise the system directly and extract valuable information. In terms of airport informational security, there are a lot to take into consideration, from digitalized processes (e.g. flight display, check-in process) to all human activities (e.g. ensuring guidance to the gates, welcoming people on board). Due to the latest trend of BYOD (Bring Your Own Device), the introduction of the new generation e-Enabled aircraft, such as Boeing 787 (including all the technologies they support and wireless connectivity) contributed to the growth of the cyber-security breaches. In order to reduce these events, people should understand the danger they can easily generate using, for instance, mobile terminals during a flight. For the prevention of malicious attacks, the authorized personnel have to conduct an in-depth analysis of all the security interconnections which were established between different networks. The main idea of this paper is to describe several use-cases where the cyber-security field related to airports is brought to the public attention.


  • Cyber-security
  • Cyber-attacks
  • Airport
  • Threats
  • Vulnerabilities

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions


  1. Gopalakrishnan, K., Govindarasu, M., Jacobson, D.W., Phares, B.M.: Cyber security for airports. Int. J. Traffic Transp. Eng. 3(4), 365–376 (2013)

    CrossRef  Google Scholar 

  2. Aviation Cyber Security Strategy. Accessed 1 Oct 2018

  3. National Safe Skies Alliance (2018). Accessed 1 Oct 2018

  4. Suciu, G., Scheianu, A., et al.: Cyber-attacks – the impact over airports security and prevention modalities. In: Trends and Advances in Information Systems and Technologies, WorldCIST 2018, pp. 1–8 (2018)

    Google Scholar 

  5. Bernard, L.: Emerging threats from cyber security in aviation – challenges and mitigations. J. Aviat. Manag. (2014)

    Google Scholar 

  6. Nojeim, G.T.: Cybersecurity and freedom on the internet. J. Natl. Secur. Law Policy 4, 119 (2010)

    Google Scholar 

  7. Duchamp, H., Bayram, I., Korhani, R.: Cyber-security, a new challenge for the aviation and automotive industries. In: Seminar in Information Systems: Applied Cybersecurity Strategy for Managers, pp. 1–4 (2016)

    Google Scholar 

  8. Strohmeier, M., Schäfer, M., Smith, M., Lenders, V., Martinovic, I.: Assessing the impact of aviation security on cyber power. In: 8th International Conference on Cyber Conflict, pp. 1–4 (2016)

    Google Scholar 

  9. Cyber Risk Outlook 2018: Centre for Risk Studies, University of Cambridge (2018).

  10. Lal, K., Fitzhardinge, N., et al.: Global air navigation services performance report 2014 (2014)

    Google Scholar 

  11. ICAO: Aviation Unites on Cyber Threat. Accessed 1 Oct 2018

  12. Tommaso, D.Z., Fabrizio, A., Federica, C.: The Defence of Civilian Air Traffic Systems from Cyber Threats. IAI (2016).

  13. Kjaerland, M.: A taxonomy and comparison of computer security incidents from the commercial and government sectors. Comput. Secur. 25(7), 522–538 (2006)

    CrossRef  Google Scholar 

  14. Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput. Secur. 24(1), 31–43 (2005)

    CrossRef  Google Scholar 

  15. Rabiah, A., Zahari, Y.: A dynamic cyber terrorism framework. Int. J. Comput. Sci. Inf. Secur. 10(2), 1–4 (2012)

    Google Scholar 

  16. Blackwell, C.: A security ontology for incident analysis. In: Proceedings of the Sixth Annual Workshop on CyberSecurity and Information Intelligence Research, pp. 1–4 (2010)

    Google Scholar 

  17. Giraldo, J., Sarkar, E., et al.: Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des. Test 34(4), 7–17 (2017)

    CrossRef  Google Scholar 

  18. Accenture: Midyear cybersecurity risk review forecast and remediations (2017).

  19. Mohurle, S., Patil, M.: A brief study of WannaCry Threat: Ransomware Attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 1938–1940 (2017)

    Google Scholar 

  20. Ehrenfeld, J.M.: WannaCry, cybersecurity and health information technology: a time to act. J. Med. Syst. 41, 104 (2017)

    CrossRef  Google Scholar 

  21. Waheed, M., Cheng, M.: A System for real-time monitoring of cybersecurity events on aircraft. In: IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), pp. 1–4 (2017)

    Google Scholar 

  22. Delain, O., Ruhlmann, O., Vaultier, E., Johnson, C., Shreeve, M., Sirko, P., Prozserin, V.: Addressing airport cyber-security – Final report (2016)

    Google Scholar 

  23. Nasser Al-Mhiqani, M., Ahmad, R., Mohamed, W.: Cyber-security incidents: a review cases in cyber-physical systems. Int. J. Adv. Comput. Sci. Appl. 9(1), 499–508 (2018)

    Google Scholar 

  24. Koch, T., Moller, D.P.F., Deutschmann, A.: Model-based airport security analysis in case of blackouts or cyber-attacks. In: 2017 IEEE International Conference on Electro Information Technology (EIT), Lincoln, NE (2017)

    Google Scholar 

  25. Moller, D.P.F.: Guide to Computing Fundamentals in Cyber-Physical Systems. Springer, Heidelberg (2016)

    CrossRef  Google Scholar 

  26. Astrom, K.J., Murray, R.M.: Feedback Systems - An Introduction for Scientists and Engineers. Princeton University Press, Princeton (2009)

    MATH  Google Scholar 

  27. Crow, M.L.: Computational methods for electric power systems. In: Grigsby, L.L. (ed.) Electric Power Engineering, 2nd edn. CRC Press, Boca Raton (2010)

    Google Scholar 

  28. Ilic, M.D., Zaborsky, J.: Dynamics and Control of Large Electric Power Systems. Wiley Interscience, New York (2000)

    Google Scholar 

  29. Grainger, J.J., Stevenson Jr., W.D.: Power system analysis. In: Electrical and Computer Engineering, 1st edn. McGraw-Hill Education (1994)

    Google Scholar 

  30. Kanlapuli Rajasekaran, R., Frew, E.: Cyber security challenges for networked aircraft. In: International Conference on Neuron Scattering (ICNS) (2017)

    Google Scholar 

Download references


This paper has been supported in part by UEFISCDI Romania through projects ALADIN, ToR-SIM and ODSI, and funded in part by European Union’s Horizon 2020 research and innovation program under grant agreement No. 777996 (SealedGRID project) and No. 787002 (SAFECARE project).

Author information

Authors and Affiliations


Corresponding author

Correspondence to George Suciu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suciu, G., Scheianu, A., Petre, I., Chiva, L., Bosoc, C.S. (2019). Cybersecurity Threats Analysis for Airports. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham.

Download citation