Privacy-Preserving IoT in Connected Aircraft Cabin

📅 2025-11-19
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the fundamental tension between data collaboration and privacy/intellectual property (IP) protection in multi-vendor aircraft cabin IoT environments, this paper proposes a lightweight privacy-enhancing framework. Built upon the CSMIM secure communication architecture, it integrates configurable differential privacy and additive secret sharing, enabling efficient privacy preservation on resource-constrained embedded devices. A key contribution is the empirical finding that computational architecture design impacts system performance significantly more than the choice of privacy algorithm—leading to the formulation of architecture–privacy co-design principles for trustworthy IoT collaboration. Experiments demonstrate negligible privacy overhead (<2% CPU utilization, <1 ms latency), while achieving strong privacy guarantees (ε ≤ 1) and strict vendor IP isolation; data utility remains at 98.7%. This work delivers the first systematic solution for aviation IoT data governance that simultaneously satisfies regulatory compliance, practical applicability, and deployability.

Technology Category

Application Category

📝 Abstract
The proliferation of IoT devices in shared, multi-vendor environments like the modern aircraft cabin creates a fundamental conflict between the promise of data collaboration and the risks to passenger privacy, vendor intellectual property (IP), and regulatory compliance. While emerging standards like the Cabin Secure Media-Independent Messaging (CSMIM) protocol provide a secure communication backbone, they do not resolve data governance challenges at the application layer, leaving a privacy gap that impedes trust. This paper proposes and evaluates a framework that closes this gap by integrating a configurable layer of Privacy-Enhancing Technologies (PETs) atop a CSMIM-like architecture. We conduct a rigorous, empirical analysis of two pragmatic PETs: Differential Privacy (DP) for statistical sharing, and an additive secret sharing scheme (ASS) for data obfuscation. Using a high-fidelity testbed with resource-constrained hardware, we quantify the trade-offs between data privacy, utility, and computing performance. Our results demonstrate that the computational overhead of PETs is often negligible compared to inherent network and protocol latencies. We prove that architectural choices, such as on-device versus virtualized processing, have a far greater impact on end-to-end latency and computational performance than the PETs themselves. The findings provide a practical roadmap for system architects to select and configure appropriate PETs, enabling the design of trustworthy collaborative IoT ecosystems in avionics and other critical domains.
Problem

Research questions and friction points this paper is trying to address.

Resolving data governance conflicts in multi-vendor IoT aircraft cabins
Closing privacy gaps between secure communication and application layers
Balancing privacy protection with data utility in resource-constrained systems
Innovation

Methods, ideas, or system contributions that make the work stand out.

Integrating Privacy-Enhancing Technologies atop secure communication backbone
Using Differential Privacy for statistical data sharing
Applying additive secret sharing scheme for data obfuscation
🔎 Similar Papers
2024-02-01Italian National Conference on SensorsCitations: 2
N
Nilesh Vyas
Airbus Central R&T, Germany
B
Benjamin Zhao
School of Computing, Macquarie University, Sydney, NSW 2109, Australia
A
Aygun Baltaci
Airbus Central R&T, Germany
Gustavo de Carvalho Bertoli
Gustavo de Carvalho Bertoli
Airbus
Network SecurityMachine LearningSecurity & PrivacyIoTEmbedded Systems
H
Hassan Asghar
School of Computing, Macquarie University, Sydney, NSW 2109, Australia
M
Markus Klugel
Airbus Central R&T, Germany
G
Gerrit Schramm
Airbus Central R&T, Germany
M
Martin Kubisch
Airbus Central R&T, Germany
Dali Kaafar
Dali Kaafar
Professor, Executive Director, Research Group Director Faculty of Science and Engineering Macquarie
Privacy-preserving technologiesCyber SecurityMachine learningInformation SecurityMeasurement and Modeling