Advances in Networks

Submit a Manuscript

Publishing with us to make your research visible to the widest possible audience.

Propose a Special Issue

Building a community of authors and readers to discuss the latest research and develop new ideas.

Hacking an Aircraft: Hacking the In-flight Entertainment System

When it comes to systems that rely on computers and communications, we describe security as the prevention of intentional and, to a large extent, unintentional misuse that could compromise desired system behavior. In the context of existing safety, development, and certification, this study provides a practical understanding of how cyber security effects airplane computer system architecture. There's more to aviation than planes. It is backed up by the necessary ground infrastructure and equipment, as well as a large-scale computer network. Operations using computer networks to disrupt, deny, degrade, or destroy information housed in computers and computer networks, or the machines and networks themselves, are known as virtual attacks against the computer network. This paper discusses some of the most important security concerns that occur when it comes to aviation safety and reliability. We believe that many of the past accidents may have been perpetrated deliberately, and that some of them could be replicated maliciously now. We begin by looking at common security weaknesses and threats in aviation and its supporting infrastructure, as well as recalling some prior occurrences. Then we analyze what catastrophes are probable, if not inevitable, and what we might do in response.

Aviation, Information Security, Cyber Attack

APA Style

Eman Ali Metwally, Haytham Tarek Mohammed. (2022). Hacking an Aircraft: Hacking the In-flight Entertainment System. Advances in Networks, 10(1), 7-14.

ACS Style

Eman Ali Metwally; Haytham Tarek Mohammed. Hacking an Aircraft: Hacking the In-flight Entertainment System. Adv. Netw. 2022, 10(1), 7-14. doi: 10.11648/

AMA Style

Eman Ali Metwally, Haytham Tarek Mohammed. Hacking an Aircraft: Hacking the In-flight Entertainment System. Adv Netw. 2022;10(1):7-14. doi: 10.11648/

Copyright © 2022 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License ( which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. C. Royalty, “Cyber Security for Aeronautical Networked Platforms - What does it mean to me in commercial aviation design?,” 2012, doi: 10.2514/6.2012-2417.
2. S. Tomáš, K. Ivan, and S. Stanislav, “Present and potential security threats posed to civil aviation,” Incas Bull., vol. 4, no. 2, pp. 169–175, 2012, doi: 10.13111/2066-8201.2012.4.2.17.
3. M. L. Olive, R. T. Oishi, and S. Arentz, “Commercial aircraft information security-an overview of ARINC report 811,” AIAA/IEEE Digit. Avion. Syst. Conf. - Proc., pp. 1–12, 2006, doi: 10.1109/DASC.2006.313761.
4. C. A. Wargo and C. Dhas, “Security consideratiolis for the e-enabled aircraft,” IEEE Aerosp. Conf. Proc., vol. 4, pp. 1533–1550, 2003, doi: 10.1109/AERO.2003.1235083.
5. N. Thanthry and R. Pendse, “Aviation data networks: Security issues and network architecture,” IEEE Aerosp. Electron. Syst. Mag., vol. 20, no. 6, pp. 3–8, 2005, doi: 10.1109/MAES.2005.1453803.
6. R. Robinson, M. Li, and K. Sampigethaya, “Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety ƒ A irplane A ssets D istribution S ystem ƒ Assessment according to the Common Criteria ƒ Conclusion,” no. September, pp. 1–18, 2007.
7. S. K. P. Alampalayam and S. Srinivasan, “Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks,” no. May, 2014.
8. S. A. Kumar, “Classification and Review of Security Schemes in Mobile Computing,” Wirel. Sens. Netw., vol. 02, no. 06, pp. 419–440, 2010, doi: 10.4236/wsn.2010.26054.
9. S. a Lintelman, K. Sampigethaya, M. Li, R. Poovendran, and R. V Robinson, “High Assurance Aerospace CPS & Implications for the Automotive Industry,” Proc. Natl. Work. High Confid. Automotice Cyber-Physical Syst., 2008.
10. R. Poovendran and D. Von Oheimb, “Network-Enabled Commercial Airplane Operations,” pp. 1–7.
11. “FAA: Slammer didn’t hurt us, but other attacks coming | Network World.” (accessed Apr. 16, 2022).
12. “US air traffic faces ‘serious harm’ from cyber attackers • The Register.” (accessed Apr. 16, 2022).
13. “Report: Hackers broke into FAA air traffic control systems - CNET.” (accessed Apr. 16, 2022).
14. “Istanbul Ataturk International AirportSecurity Affairs.” (accessed Apr. 16, 2022).
15. “Phishing Scam Targeted 75 US Airports.” (accessed Apr. 16, 2022).
16. “Attack On LOT Polish Airline Grounds 10 Flights.” (accessed Apr. 16, 2022).
17. “Main Cyber-Security Challenges in Aviation.” (accessed Apr. 16, 2022).
18. “Ukraine says to review cyber defenses after airport targeted from Russia | Reuters.” (accessed Apr. 16, 2022).
19. “Cathay Pacific Cyber Attack Is World’s Biggest Airline Data Breach.” (accessed Apr. 16, 2022).
20. “British Airways Says ‘Sophisicated’ Hacker Stole Data on 380,000 Customers.” (accessed Apr. 16, 2022).
21. “Delta, Sears Report Data Breach by Service Provider.” (accessed Apr. 16, 2022).
22. “Brit airport pulls flight info system offline after attack by ‘online crims’ • The Register.” (accessed Apr. 16, 2022).
23. “Air Canada suffers major app data breach of 20,000 customers - Digital Journal.” (accessed Apr. 16, 2022).
24. “Boeing hit by WannaCry virus, but says attack caused little damage | The Seattle Times.” (accessed Apr. 16, 2022).
25. “Airbus Statement on Cyber Incident | Airbus.” (accessed Apr. 16, 2022).
26. “Ransomware attack on Albany Airport on Christmas 2019 - Cybersecurity Insiders.” (accessed Apr. 16, 2022).
27. “Air NZ faces data breach after staff accounts phished.” (accessed Apr. 16, 2022).
28. “DoppelPaymer Ransomware Used to Steal Data from Supplier to SpaceX, Tesla | Threatpost.” (accessed Apr. 16, 2022).
29. “Ransomware attack hits ST Engineering’s USA aerospace unit | News | Flight Global.” (accessed Apr. 16, 2022).
30. “Airline software super-bug: Flight loads miscalculated because women using ‘Miss’ were treated as children • The Register.” (accessed Apr. 16, 2022).
31. “Chris Roberts who ‘hacked a commercial flight’ also hacked the ISS | Daily Mail Online.” (accessed Apr. 16, 2022).
32. “Air France plane carrying 228 people disappears in storm over the Atlantic.” (accessed Apr. 16, 2022).
33. Y. G. Sun, L. Wang, and W. X. Chen, “A sensor of aero-engine real-time fault detection system based on ARM9,” Adv. Mater. Res., vol. 591–593, pp. 1470–1474, 2012, doi: 10.4028/
34. T. Humphreys, “Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing,” Univ. Texas Austin (July 18, 2012), 2012.
35. S. A. P. Kumar and B. Xu, “Vulnerability Assessment for Security in Aviation Cyber-Physical Systems,” 2017, doi: 10.1109/CSCloud.2017.17.
36. Conventions, “Aviation Security : The Role of IFALPA and its Member Associations,” no. December, pp. 1–2, 2021.
37. “ICAO Standards | IHS Markit.” (accessed Apr. 16, 2022).