Next Article in Journal
Aerodynamic Optimization of Airfoil in Wide Range of Operating Conditions Based on Reinforcement Learning
Next Article in Special Issue
Validation of an AI-Assisted Terrain-Aided Navigation Algorithm Using Real-World Flight Test Instrumentation Data
Previous Article in Journal
The Calculation and Optimization Methodology of Repairable Elements of a UAV Structure
Previous Article in Special Issue
Ontological Airspace-Situation Awareness for Decision System Support
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Airborne Network Information Security Risk Assessment Method Based on Improved STPA-TOPSIS

1
Institute of Scientific Innovation, Civil Aviation University of China, Tianjin 300300, China
2
School of Safety Science and Engineering, Civil Aviation University of China, Tianjin 300300, China
3
School of Electronic Information and Automation, Civil Aviation University of China, Tianjin 300300, China
4
Key Laboratory of Civil Aviation Aircraft Airworthiness Certification Technology, Civil Aviation University of China, Tianjin 300300, China
*
Author to whom correspondence should be addressed.
Aerospace 2025, 12(5), 442; https://doi.org/10.3390/aerospace12050442
Submission received: 16 April 2025 / Revised: 11 May 2025 / Accepted: 15 May 2025 / Published: 16 May 2025
(This article belongs to the Collection Avionic Systems)

Abstract

This study addresses threat scenario identification and quantitative evaluation in the context of the information security risk assessment process for airborne networks. A method integrating an improved system-theoretic process analysis (STPA) and the technique for order preference by similarity to an ideal solution (TOPSIS) is proposed. A safety control interaction structure is first established based on the system-level loss definition to identify unsafe control actions and derive STPA-Sec threat conditions. Then, the opinion aggregation method based on the weakest t-norm is introduced to address the uncertainty from insufficient expert consensus and opinion deviation. To address the intrinsic correlations among evaluation indicators, the criteria importance through intercriteria correlation (CRITIC) method is applied to determine indicator weights. These weights are subsequently incorporated into the TOPSIS framework to assess the identified threat scenarios. Comparative analysis confirms the effectiveness of the proposed approach. The results show that the improved STPA-TOPSIS method enables the reliable identification of security threats in airborne networks and supports the prioritization of threat scenarios by severity, facilitating the implementation of targeted mitigation strategies.

1. Introduction

The advancement of aircraft communication technology has led to an increasing reliance on networks for data communication in airborne systems. Civil aircraft communication has evolved from ARINC 429 and ARINC 629 to AFDX [1] and TTE networks. This transition from digital to networked communication has significantly enhanced data transmission rates. Currently, the Airbus A380 and Boeing 787 utilize AFDX networks for system communication. As AFDX networks are based on internet protocols, they are susceptible to various information security threats prevalent in general networks. Airborne networks, serving as the “nerve center” of modern aircraft, operate within an open information interaction environment that exacerbates information security concerns. These concerns extend to airborne control, navigation, communication, and passenger service systems, which may be vulnerable to network attacks such as denial of service and data tampering, thereby compromising the safety and reliability of aircraft. Hence, airborne network security is critical for ensuring flight safety and aviation data integrity.
Airborne networks encounter numerous external threats, including unauthorized access, use, disclosure, denial, disruption, modification, and destruction, which may yield varying effects on operational safety. For aircraft, if threats penetrate critical asset systems, severe consequences may ensue. Therefore, identifying and analyzing potential threat conditions affecting airborne network security is essential for conducting a thorough in-formation security assessment. Accurate identification of these threat conditions can guide the formulation of subsequent risk assessment indicators. Traditional safety analysis methods for airborne networks often employ linear decomposition using the accident chain model. While these methods are suitable for simple, linear cause–effect relationships in accident chains, they struggle to effectively analyze the interactions among components in increasingly complex airborne networks. To describe the functional interactions be-tween system modules, NACY proposed the system-theoretic process analysis (STPA [2]), which redefines safety analysis issues as control problems for resolution. Wang et al. [3] used STPA in the safety assessment of hydrogen liquefaction systems, identifying potential risks and quantitatively evaluating risk values using the best-worst method, while proposing safety constraints to prevent accidents and enhance system reliability. Oginni et al. [4] used STPA in the safety analysis of the UK railway system, uncovering complex interaction risks that traditional methods failed to capture. Zhang et al. [5] applied STPA to analyze the safety of intelligent railway driving assistance systems, identifying critical risk factors and developing targeted hazard control strategies. These studies demonstrate the effectiveness of STPA in the safety analysis of complex systems and its capability to identify potential control safety issues. In the domain of information security, it is crucial to focus not only on the internal interaction safety of information systems but also on security issues arising from external attacks or malicious activities. Thus, this paper aims to develop a risk identification framework based on the existing STPA method, with a focus on external threats.
STPA-Sec [6] is an improved method based on STPA. It identifies potential hazards by analyzing the information interaction behavior and system architecture of cyber-physical systems, with a focus on unsafe control actions caused by information system threats. While it has been applied in several safety critical fields, its application in the aviation field is relatively limited. Salgado et al. [7] applied STPA-Sec to airborne collision avoidance systems to enhance aircraft safety from the perspective of system threats. Guskova et al. [8] applied STPA-Sec to air traffic management, effectively identifying potential safety vulnerabilities and hazards. Sahay et al. [9] applied STPA-Sec to the cyber ship system framework and determined the threat and hazard scenarios of the cyber ship framework as well as the safety requirements. Li et al. [10] used STPA-Sec for qualitative analysis and determined the causation scenarios and safety requirements of automotive automatic emergency braking systems. The STPA-Sec method emphasizes external threats that systems may encounter, facilitating more effective identification of unsafe interactions and a comprehensive assessment of potential safety risks, thereby ensuring the security and reliability.
As an active defense technology, information security risk assessment must consider multidimensional evaluation criteria and factors. Numerous scholars have investigated information security risk assessment indicators across various domains. Li et al. [11] established a detailed index system utilizing the analytic hierarchy process (AHP) and Intuitionistic Fuzzy Sets, including five dimensions: risk analysis, risk prevention, risk control, risk treatment, and monitoring and improvement. Shirvani et al. [12] proposed a risk assessment framework using custom standards and the STRIDE threat model to enhance the identification of threats and risks within the electric vehicle ecosystem. Tsai et al. [13] constructed an index system comprising risk, demand, attack, and configuration layers, integrating safety requirements, potential attack methods, and system configurations, while using AHP to calculate weights for assessing and managing wireless networks. Sato et al. [14] examined the probability dependency relationships among information assets, threats, and vulnerabilities by focusing on malicious communication within the network. Dong et al. [15] established an information security risk assessment system for smart grids, employing a D number preference relation enhanced AHP to determine indicator weights and combining grey theory to derive a comprehensive evaluation value and risk level. Li et al. [16] divided the computer network security risk assessment system into three main sections: assets, access control, and communication and operation, further refining each into multiple detailed evaluation indicators. Although these studies have advanced the construction of evaluation index systems, most are limited to simple optimizations for specific industries or fields, with constraints on applicability in complex interaction environments. Particularly regarding the critical criterion of threat conditions, existing research frequently employs generic threat conditions or linear logic-based safety analysis methods, failing to fully consider interaction risks among components in complex information systems, which may lead to overlooked potential risks. In the highly complex interaction environment of airborne networks, traditional general information security risk assessment systems are clearly inadequate. Therefore, it is necessary to expand threat conditions within a general assessment framework to enhance the adaptability of the assessment system to airborne networks. This study improves the STPA, capitalizing on its capability to identify complex interaction risks in airborne networks to further refine threat scenarios. By integrating the interaction risks identified by STPA into the assessment system, a more comprehensive coverage of potential safety threats arising from component interactions in airborne networks is achieved, thereby enhancing the scientific rigor and accuracy of assessments and providing a more reliable theoretical foundation for airborne network security risk assessment.
In the field of information security risk assessment, extensive theoretical research has been conducted utilizing various risk analysis methods and assessment tools tailored for different systems or specific target networks. Wang et al. [17] proposed combining Pythagorean fuzzy AHP with a technique for order preference by similarity to an ideal solution (TOPSIS) to address expert cognitive uncertainty in airborne network information security risk assessment. Alhakami [18] integrated fuzzy theory into energy management and control systems to identify optimal communication network solutions against attacks and risks, reducing expert uncertainty but neglecting interactions among evaluation indicators. Tian et al. [19] used the GRA-TOPSIS method based on EW-CRITIC combination weighting to comprehensively evaluate the air combat control ability for anti-ballistic missiles, but the selection of preference coefficients introduced some subjectivity. Alshahrani et al. [20] presented a fuzzy TOPSIS method to analyze and rank IT risk factors in an organizational environment with 25 decision makers. Wu et al. [21] used the CRITIC-TOPSIS method to evaluate bridge construction safety risks in marine environments, determining secondary indicator weights with CRITIC and assessing construction safety risk levels with TOPSIS. Baylan [22] combined AHP and TOPSIS for project risk quantitative analysis, also applicable at the project activity level. Awodi et al. [23] applied fuzzy TOPSIS to rank nuclear decommissioning risk factors. Borges et al. [24] analyzed integrating STPA with TOPSIS for system safety assessment to prioritize unsafe control actions. Tian et al. [25] used the CRITIC-entropy weighting method and Gray-TOPSIS correlation analysis method to assess risks, enhancing the accuracy of identifying risk hotspots on airport surfaces. Li et al. [26] created a coal mine safety evaluation index system, utilizing TOPSIS combined with the entropy weight method to mitigate subjectivity in risk weight allocation and enhance the objectivity of assessment results. These studies show hybrid MCDM methods based on TOPSIS [27] are widely used in various fields. By combining with other methods, they give full play to their respective advantages to solve multi criterion decision making problems in risk assessment, enhancing the validity and reliability of assessment results. Many of these methods contribute to reducing expert subjectivity but generally fail to adequately consider the interrelationships among assessment indicators, leading to limitations in assessing objectivity and overall system risk, particularly in complex information systems. This limitation can adversely affect the comprehensiveness and accuracy of assessments, highlighting the urgency to develop an assessment method that comprehensively considers the interactions among indicators to better reflect the true security status of airborne networks.
One of the main challenges in airborne network information security risk assessment is the lack of historical data. Several traditional risk assessment methods, such as fault tree analysis (FTA), failure mode and effects analysis (FMEA), and MITRE ATT & CK, have been used in aviation. Liu et al. [28] built an FMEA framework for risk assessment of aircraft integrated drive generators, combined FMEA with TOPSIS to classify failure modes, and verified the method’s effectiveness. Maheve et al. [29] improved the safety of actuator controllers in aircraft control systems through fault tree analysis. However, FMEA and FTA mainly focus on analyzing the failure modes of individual components and their impact on the system. They have limited ability to analyze interaction problems and simultaneous multiple component failures in complex systems, and their results are prone to subjective influences. Georgiadou et al. [30] used MITRE ATT & CK for network security assessment but found it difficult to directly quantify and prioritize system related risks. In contrast, STPA-Sec focuses on interactions between system components and the impact of external threats, enabling macro level risk scenario identification. CRITIC-TOPSIS, through objective weight determination and comprehensive assessment, ranks and assesses risks more accurately, providing a stronger basis for decision making.
The paper proposes a network threat condition identification method based on the improved STPA to address complex interaction risks in airborne network systems. It employs TOPSIS to rank threat scenarios and conduct a comprehensive assessment of identified threats. The opinion aggregation method based on the weakest t-norm ( T ω ) [31] is applied and the criteria importance through intercriteria correlation (CRITIC [32]) method is employed to determine the weights of evaluation indicators, taking into account both the differences and correlations in expert scores to enhance the objectivity of assessment results. Finally, the effectiveness of the proposed method is validated through a comparison of the closeness of different assessment methods.

2. Improved STPA-TOPSIS Evaluation Framework

In addressing the limitations of traditional information security assessment methods for complex airborne network threat identification and risk assessment, this paper proposes an airborne network information security assessment framework based on the improved STPA-TOPSIS method. The flowchart of framework is illustrated in Figure 1, and the comprehensive information security assessment process comprises three components.
The first component is a safety analysis using the improved STPA approach. Starting from the simplified airborne network system architecture interaction diagram provided in the airworthiness document RTCA DO-356A [33], the improved STPA is applied to the airborne network architecture. Initially, the system-level losses and hazards of the airborne network are defined. Subsequently, a safety interaction model of the airborne network components is constructed, and unsafe interactions among these components are identified. Finally, utilizing general causal factors and integrating the behavior of malicious unauthorized electronic interactions, this paper summarizes the interaction risks for the airborne network.
The second component constructs a risk assessment index system for airborne networks, considering the complexity of airborne network interactions and aligning with the latest national standards for information security risk assessment. This system integrates the threat conditions identified and analyzed in the first component to further enhance and expand the assessment framework.
The third component performs analysis and assessment of threat scenarios. Using the CRITIC method for objective weight, it incorporates weights into a decision matrix based on evaluation indicators and threat scenarios. The TOPSIS method is applied to quantitatively evaluate the interactive effects of various threat scenarios on airborne networks by calculating their closeness coefficients.

2.1. Improved STPA Method for Airborne Network Information Security

The STPA is used to identify and analyze safety risks in complex systems, emphasizing not only individual component failures but also system-wide interactions. The core premise of the STPA method is that safety issues arise predominantly from interactions among system components and the overall system design, thereby providing a significant advantage in analyzing complex systems [34].
The improved STPA method extends safety analysis into the security domain, evolving into the STPA-Sec method. Unlike the traditional STPA, which focuses primarily on internal faults, STPA-Sec emphasizes external threats. It enhances the original four analysis steps by focusing on intentional unauthorized electronic interaction (IUEI) [35]. The STPA-Sec method for airborne networks comprises the following four steps:
  • Define system-level losses and hazards.
This step corresponds to the traditional STPA method, which includes identifying system characteristics, defining its state or conditions, and recognizing hazardous factors and potential losses that could lead to accidents within a specific environment.
2.
Construct the functional interaction structure of the model.
Unlike the component-based control structure of traditional STPA, the STPA-Sec method emphasizes a functional interaction structure. This structure is widely utilized in safety analysis, including input and output interactions in network configurations, ex-tending beyond the control actions and feedback of control systems.
3.
Identify unsafe control actions (UCAs).
UCAs can be classified into four categories: failing to perform a required interaction, executing an incorrect interaction, timing the interaction inaccurately, and interactions that are excessively prolonged or conclude prematurely.
4.
Extract causal factors.
Causal factors are potential triggers for UCAs and hazards, existing throughout the functional interaction loop. While the four types of interaction loops in traditional STPA can be further refined into ten general causal factors, the enhancement of STPA-Sec primarily focuses on considering IUEI during causal factor extraction to identify external threats to airborne networks.
Unlike traditional STPA methods, which concentrate on internal component interactions within complex systems, the STPA-Sec method used in this study addresses the safety concerns of airborne network information security. It not only addresses safety issues arising from internal interactions but also confronts risks stemming from interactions with external networks. The STPA-Sec method emphasizes external threats that airborne networks may encounter, facilitating more effective identification of unsafe interactions and a comprehensive assessment of potential safety risks, thereby ensuring the security and reliability of airborne networks.

2.2. Airborne Networks Security Risk Assessment Method Based on the CRITIC-TOPSIS Methodology

To conduct a thorough analysis and assessment of threat scenarios in airborne networks, this paper employs a CRITIC-TOPSIS-based information security risk assessment model. Traditional risk assessment methods fail to comprehensively and objectively reflect the risk status of airborne networks. To address this issue, this study gathers evaluation data through expert group scoring. The CRITIC method objectively determines the weights of evaluation indicators, balancing the subjectivity inherent in expert assessments with the objective significance of the information among indicators. The TOPSIS method, utilizing the concepts of positive ideal solution (PIS) and negative ideal solution (NIS), quantitatively ranks the complex and variable threat scenarios in airborne networks, aiding decision-makers in promptly identifying and prioritizing critical security risks. The integration of CRITIC and TOPSIS combines expert subjective judgment with objective analysis, enhancing the rigor and practical applicability of the assessment results, thereby providing support for information security risk management in airborne networks.

2.2.1. The Expert Opinion Aggregation Method Based on the T ω

The triangular fuzzy number is denoted as A = ( a , b , c ) , and its membership function is shown in Figure 2 and the Equation (1):
μ A x = x a b a ,   a x b , c x c b ,   b x c , 0 ,   o t h e r w i s e
In this context, a represents the lower bound of A , b represents the upper bound of A . The difference between a and b signifies the fuzziness of A ; a larger difference means higher fuzziness. When a = b = c , A becomes a non-fuzzy number.
The theory of Intuitionistic Fuzzy Sets (IFS) is an extension of traditional fuzzy set theory. Unlike traditional fuzzy sets, IFS considers membership, non-membership, and hesitation degrees of fuzzy numbers, making it better at capturing the ambiguity and uncertainty of expert opinions. An IFS A is represented as a triplet ordered set.
A = x , μ A x , v A x , x X
μ A x + v A x ϵ 0,1 , x X
π A x = 1 μ A x v A x , 0 < π A x < 1 , x X
In the Equations (2), (3), and (4), μ A : X [ 0,1 ] and v A : X [ 0,1 ] denote the membership degree and non-membership degree, respectively. π A ( x ) A is defined as the intuitionistic fuzzy metric of x A , which represents the hesitation degree of x with respect to A .
In the triangular intuitionistic fuzzy set, the triangular intuitionistic fuzzy number is denoted as A = ( a , b , c ; a , b , c ) , and its non-membership functions are as follows:
v A x = b x b a ,   a x b , x b c b ,   b x c , 1 ,   o t h e r w i s e
To determine the weights of experts in the airborne network security risk assessment process, this paper adopts an expert weighting method based on multi-dimensional scoring. Let the total multi-dimensional score of the k -th expert be A k , and the calculation formula for its weight δ k is as follows:
δ k = A k k = 1 P A k , k = 1,2 , , m
A k = A k 1 + A k 2 + + A k n
k 1 , k 2 , , k n represents the scores of experts across n dimensions. This study evaluates experts in three core dimensions: job title, education, and work experience. Each dimension is weighted appropriately and quantified. The total scores of experts are calculated per the evaluation criteria and Formula (7), and their weights are derived using Formula (6).
Multiple evaluators assess a threat scenario, yielding multiple results. To aggregate these into a comprehensive fuzzy number, both the degree of consensus among differing opinions and the importance of the evaluators are crucial. The similarity aggregation method, considering both expert weights and opinion consensus, enhances the reliability of aggregated result.
During the opinion aggregation process, uncertainties can accumulate. The weakest t-norm, a classic form of the T-norm, performs fuzzy operations while preserving the fuzzy number form. It reduces the width of the reliability interval and lowers the impact of fuzzy accumulation. The T ω is a common operator in algorithms for evaluating complex systems under uncertainty as it reduces the accumulation of fuzziness.
T ω x , y = x ,   y = 1 , y ,   x = 1 , 0 ,     o t h e r w i s e
The basic operational rules for two triangular intuitionistic fuzzy numbers (TIFN), A = ( a 1 , b 1 , c 1 ; a 1 , b 1 , c 1 ) and B = ( a 2 , b 2 , c 2 ; a 2 , b 2 , c 2 ) , are shown in Table 1.
The evaluation results of experts E s and E k for a certain event are converted into TIFNs A s = ( a j , b j , c j ; a j , b j , c j ) and A k = ( a k , b k , c k ; a k , b k , c k ) , respectively. Then, the similarity function S between the two fuzzy numbers is defined as follows:
S A s , A k = E V ( A s ) E V ( A K ) , E V ( A s ) E V ( A k ) E V ( A k ) E V ( A s ) , E V ( A s ) E V ( A k )
E V A s = ( a j + a j ) + 4 b j + ( c j + c j ) 8
Considering the weights of evaluators, the consistency of opinions is calculated. The weighted consistency of expert E s is calculated as follows:
A D E s = k = 1 , k s m W E k S ( A s , A k ) k = 1 , k s m W E k
In Formula (11), W ( E k ) is the weight of expert E k , and m is the number of experts. Based on the weighted consistency A D ( E s ) , the relative consistency of expert E s ’s opinion is calculated in the Formula (12).
R A E S = A D ( E s ) s = 1 m A D ( E s )
A W E S = β W E s + 1 β R A E s , 0 β 1
R = s = 1 m T ω A W E s A s = A W ( E 1 ) A 1 T ω A W E 2 A 2 T ω T ω A W ( E m ) A m
In Formula (13), the weights of experts and the relative consistency are combined to calculate the aggregated weight of expert E s . Finally, Formula (14) aggregates expert opinions based on the T ω operator to obtain the overall fuzzy number for a threat scenario under a specific evaluation criterion. The overall flowchart of the expert opinion aggregation process based on T ω is shown in Figure 3.

2.2.2. The Indicator Correlation Weight Determination Method

The CRITIC method serves as an objective approach for determining indicator weights in multi-attribute decision-making. It considers data characteristics and correlations between indicators to compute weights, ensuring high objectivity and rationality. In the context of airborne network risk assessment, CRITIC effectively captures the significance of each security indicator across various threat scenarios. The specific steps are as follows:
First, calculate the standard deviation of each evaluation indicator. The standard deviation reflects the variation of the indicator across different threat scenarios. In airborne networks, a larger standard deviation indicates that the security indicator exhibits greater variability across different threat scenarios, contains more information, and exerts a more substantial influence on risk assessment. The calculation formula is shown in the Equation (15):
σ j = 1 m 1 i = 1 m ( z i j z j ¯ ) 2
where
  • σ j : the standard deviation of the j -th indicator;
  • z i j : the value of the j -th indicator under the i -th threat scenario;
  • z j ¯ : the average value of the j -th indicator;
  • m : the number of threat scenarios.
Next, compute the correlation coefficient matrix between indicators. In airborne networks, a high correlation coefficient between two indicators signifies that they exhibit similar trends in risk measurement. The calculation formula for the correlation coefficient is shown in the Equation (16):
r j k = i = 1 m ( z i j z j ¯ ) ( z i k z k ¯ ) i = 1 m ( z i j z j ¯ ) 2 i = 1 m ( z i k z k ¯ ) 2
In the equation, r j k is the correlation coefficient between the j -th and k -th indicators.
Based on the data from these two steps, the conflict degree of each indicator is defined as the weighted sum of the standard deviation and the correlation, as expressed in the Equation (17):
C j = σ j k = 1 n ( 1 r j k )
In the formula, ( 1 r j k )   represents the conflict between the j -th and k -th evaluation indicators. The CRITIC method suggests that indicators with lower correlations provide more independent information; thus, greater conflict indicates that the indicator is more significant and warrants a higher weight.
Finally, the weights of the evaluation indicators are computed based on the conflict degree, as shown in the Equation (18):
w j = C j j = 1 n C j
By adhering to the outlined steps, the CRITIC method thoroughly considers the dispersion and mutual independence of each security indicator in the risk assessment of airborne networks. This approach not only enhances the validity and rationality of the assessment results, but also accurately reflects the impact of the evaluation system’s indicators on overall risk.

2.2.3. Technique for Order Preference by Similarity to Ideal Solution

The TOPSIS is a multi-attribute decision-making method used to identify optimal solutions or rank alternatives. This method is employed to evaluate the risk associated with threat scenarios in airborne networks. Initially, the PIS and NIS are calculated. The PIS represents the worst-case scenario in which all evaluation indicators achieve their most unfavorable levels, indicating the highest risk state. Conversely, the NIS signifies the best-case scenario where all indicators attain their most favorable levels, reflecting the lowest risk state. Subsequently, weighted Euclidean distances from each threat scenario to both the PIS and NIS are computed, based on the weights of each indicator. Finally, threat scenarios are ranked according to their closeness degree, which quantifies how near a scenario is to the PIS and how far it is from the NIS. This ranking process effectively assesses the risk of threat scenarios in airborne networks. Figure 4 illustrates the evaluation process of the TOPSIS method.
The main steps of the TOPSIS method are as follows:
  • Construct the weighted decision matrix and determine the ideal solution.
The calculation formulas for the PIS and the NIS are shown in the Equations (19) and (20):
X j + = max i X i j
X j = max i X i j
where
  • ( X i j ) m × n : standardized decision-making matrix;
  • X i : the rating data of the i -th threat scenario under different evaluation criteria;
  • X j : the rating data of different threat scenarios under the j -th evaluation criterion;
  • PIS: X + = ( X 1 + , X 2 + , , X n + ) ; NIS: X = ( X 1 , X 2 , , X n ) .
  • In airborne networks, the PIS represents the most disadvantageous risk state, where all indicators reach their maximum risk values. In contrast, the NIS represents the most advantageous risk state, where all indicators reach their minimum risk values.
2.
Calculate the distance between threat scenarios and the PIS/NIS.
The TOPSIS method employs Euclidean distance to compute the distances between threat scenarios and the PIS/NIS, as demonstrated in the following equations:
D i + = w j j = 1 n ( X j + X i j ) 2
D i = w j j = 1 n ( X j X i j ) 2
D i + denotes the Euclidean distance between a threat scenario and the PIS, and D i denotes the Euclidean distance between a threat scenario and the NIS. Through calculation, we can obtain the positive vector D + = ( D 1 + , D 2 + , , D n + ) T between the identified threats and the PIS, and the negative vector D = ( D 1 , D 2 , , D n ) T between the threats and the NIS. In airborne network risk assessment, a smaller D + means the threat scenario is closer to the highest risk state, while a larger D also indicates a threat scenario closer to the highest risk state.
3.
Rank threat scenarios based on closeness.
Utilizing the concept of the positive and negative distance vectors between the threat scenarios and the PIS/NIS, closeness can be quantitatively defined as the measure of how near a threat scenario is to the highest risk state. If the closeness of solution X i is denoted as ξ ( X i ) , the calculation is shown in the Equation (23):
ξ X i = D i D i + + D i
The ξ ( X i ) represents the relative risk level of a threat scenario. In airborne networks, a higher closeness implies greater proximity to the highest-risk state and an elevated risk level, whereas a lower closeness indicates a reduced risk level. Therefore, threat scenarios can be ranked according to their closeness.

3. Case Study

3.1. Threat Condition Identification for Airborne Networks Based on Improved STPA

The specific steps of the STPA-Sec method for airborne network security are delineated as follows:
The initial step defines the system-level losses and hazards of the aircraft from the perspective of information security [10]. These losses represent unacceptable events at the system-level that may lead to personnel casualties, property damage, or mission failure.
Airborne networks, as integral components of an aircraft system, may incur severe consequences if threatened or attacked through unauthorized electronic interactions. Thus, system-level losses are defined to identify those losses that are unacceptable to the system owner or stakeholders, enabling a focus on evaluating and mitigating the risks that could precipitate these losses. The system-level losses determined from the airworthiness security document DO-356A regarding aircraft safety and crew effects are detailed in Table 2.
According to the STPA-Sec method, a hazard is characterized as a system state or a set of conditions that, in conjunction with specific worst-case environmental conditions, leads to system-level losses. In the context of airborne networks, system-level hazards manifest as unsafe states resulting from unauthorized electronic interactions, which may lead to system-level losses within the network. Table 3 presents the system-level hazards and their potential losses for airborne networks.
The second step entails constructing the secure interaction structure of the airborne network.
In the aviation field, to handle the complex safety challenges in airborne networks, the RTCA DO-356A standard offers assessment methods and guidelines for airborne network information security. By dividing network systems into various security domains, it enhances information security risk management. In its simplified network model, the airborne network is split into the cabin network, maintenance network, and limited aircraft network. This improves security responsibility clarity, resource allocation, and assessment effectiveness.
By conducting risk assessments on the simplified network, we can identify key security threats and risk scenarios, and then generalize these findings to the entire airborne network architecture. The threat scenarios and assessment methods identified in this study can serve as a template for application in more complex real-world airborne network environments. This provides guidance and support for the information security assessment of the entire airborne network. The basic architecture of the simplified airborne network is shown in Figure 5.
Each network serves specific functions and communication requirements. The cabin network provides services for passengers, including in-flight entertainment and personal communication, with passengers connecting through designated devices. The maintenance network facilitates aircraft repair systems, allowing maintenance personnel to per-form authentication, system configuration updates, and access the airborne maintenance system. The cabin network server may request essential resources from the maintenance network server, such as flight altitude and cruise speed. The aircraft network manages communications for flight-related systems (communication, navigation, flight control, and fuel management), supporting overall flight operations. It enables the maintenance network server to upload critical configuration update data for system updates and maintenance. To ensure secure and efficient network communication, a maintenance gateway filters data packets and controls speed between the cabin and maintenance networks. Maintenance personnel are authenticated via the management interface of this gateway. Additionally, an aircraft gateway between the maintenance and airborne networks ensures communication security and compliance.
Based on the analysis of the airborne network system architecture and the characteristics of the STPA-Sec, a security interaction model between personnel and airborne network components is developed, as depicted in Figure 6.
The third step is to identify UCAs within the airborne network security interaction structure.
In the STPA-Sec framework, UCAs that may cause hazardous states in airborne aircraft networks are categorized into four types: providing incorrect control actions, failing to provide the necessary control actions for safety, supplying control actions with incorrect timing, and delivering control actions for excessively prolonged or insufficient durations.
To safeguard the airborne network, this study analyzes the interaction structures of airborne networks, concentrating on component interactions and personnel access to network interactions. This analysis identifies 24 UCAs in airborne networks using the STPA-Sec method, as detailed in Table 4.
The fourth step consists of extracting causal scenarios and subsequently identifying the threat conditions that affect the airborne network.
To outline all causal scenarios leading to UCAs, each UCA is examined using three threat types from the STRIDE model [36]: Tampering, Denial of Service, and Privilege Escalation. Due to space constraints, the following summarizes the causal scenario analysis process for four UCAs related to cabin resource provisioning, as illustrated in Table 5.
Based on the information presented in the table, multiple unsafe interactions within airborne networks give rise to various causal scenarios. These scenarios are categorized according to the STRIDE model and synthesized as threat conditions for airborne networks.
For example, analysis of the causal scenarios U1-3, U2-2, U2-3, U3-2, U3-3, and U4-2 shows that these scenarios describe attackers launching denial-of-service attacks to disrupt cabin networks. From these analyses, a threat condition termed “denial of cabin ser-vice” (T1 in Table 6) can be derived. Similarly, additional threat conditions (T2–T9 in Table 6) can be established by examining causal scenarios stemming from different attack types as classified by the STRIDE model. This analysis links causal scenarios among components to specific threat conditions within the airborne network.

3.2. Airborne Network Security Risk Assessment

3.2.1. Threat Scenario Analysis

GB/T 20984-2022 [37] defines the fundamental elements and their interrelationships in information security risk assessment, which comprise assets, threats, vulnerabilities, and security measures [17]. Therefore, the risk assessment of airborne networks in this study is grounded in these four elements, considering the characteristics of network information security and integrating the airworthiness security risk assessment standard DO-356A, as illustrated in Figure 7.
According to GB/T 20984-2022, confidentiality, integrity, and availability are the three main security attributes of A 1 (assets). These are reflected in the B 1 (confidentiality value), B 2 (integrity value), and B 3 (availability value) of airborne network assets during risk assessment. The exploitability of A 2 (vulnerabilities) in airborne networks is indicated by the B 4 (attack vector), B 5 (required privileges), and B 6 (attack complexity), based on the Common Vulnerability Scoring System. According to the characteristics of airborne networks, the A 3 (threat conditions) identified by the improved STPA method are incorporated into the risk assessment index system. These threat conditions include B 7 (denial of cabin service), B 8 (tampering with cabin services), B 9 (denial of maintenance service), B 10 (tampering with maintenance services), B 11 (denial of aircraft service), B 12 (tampering with aircraft services), B 13 (tampering with maintenance gateway configuration), B 14 (hijacking cabin services in the maintenance network), and B 15 (hijacking maintenance services in the aircraft network), to assess the severity of their impacts. Finally, referring to the airworthiness security document DO-356A, B 16 (protection effectiveness) is used as the evaluation index for security measures.
Referring to the airworthiness security risk assessment standard DO-356A and the threat conditions analyzed by the aforementioned improved STPA method, and integrating the four fundamental elements outlined in GB/T 20984-2022, six primary airborne network threat scenarios within the airborne network system are analyzed and identified, as illustrated in Table 7.

3.2.2. Expert Opinions Aggregation Based on T ω

To ensure the rigor of the airborne network security risk assessment, five experts from the aviation and airborne network domains constituted an assessment panel, detailed in Table 8. The selection of the experts adheres to principles of diversity and professionalism. The experts hail from aviation manufacturing companies, academic institutions, and research organizations, with job titles ranging from senior engineers to professors and researchers, offering multidisciplinary perspectives including engineering practice and academic theory. All panel members possess master’s or doctoral degrees, ensuring a comprehensive understanding of airborne network technology and security. With extensive professional experience, the evaluation group brings rich insights from key technological research and development to network security assessment. The five experts have considerable experience in airborne networks, with specializations covering airborne communication protocols (such as ARINC 429 and AFDX networks), aviation network architecture design, airborne information security, and threat analysis. They are equipped to evaluate the index system and risk scenarios scientifically from multiple perspectives. During the expert scoring process, adherence to their professional strengths, technical depth, and risk assessment experience guarantees objective and reliable results, providing robust theoretical and practical support for airborne network security risk ranking.
In order to quantitatively evaluate the expert level, the scoring criteria are defined in terms of their job titles, education level, and working time as shown in Table 8. Based on the scoring criteria in this table, the invited experts are evaluated in the three dimensions of the scoring criteria, and their expert weights are normalized according to their total scores. The specific expert information, scoring results, and final evaluation expert weights are shown in Table 9.
Based on the established airborne network security risk assessment index system, the five experts in the evaluation panel conducted a quantitative analysis of potential threat scenarios in the airborne network. Drawing on their extensive professional knowledge and practical experience, the experts meticulously analyzed the key characteristics of the risk scenarios. Adhering strictly to the assessment system outlined in this paper, they performed risk assessments for six typical threat scenarios in the airborne network across 16 evaluation criteria. To guarantee the objectivity and rigor of the assessment process, the experts utilized a triangular fuzzy scoring mechanism in combination with a percentile scoring system to categorize risk levels. The specific classifications are presented in Table 10, where risk assessments are defined as ten levels based on fuzzy risk language.
During the scoring process, the experts referred to the threat scenario assessment guidelines in air worthiness certification standard DO-356A. They also drew on their extensive research and practical experience in airborne communication protocols, aviation network architecture design, and information security protection. This allowed them to evaluate the weights of the assessment indicators and the risk levels of the threat scenarios.
The evaluation results of the five experts were aggregated and defuzzified using a T ω -based opinion aggregation algorithm. Due to space constraints, the aggregation process is illustrated with the scores of the five experts for evaluation criterion B 6 in threat scenario TS5, as shown in Table 11.
According to the steps in Figure 3, the evaluation results of the five experts can be aggregated using T ω . The comprehensive fuzzy number for TS5 under B 6 is R = ( 0.6154,0.6338,0.6892 ) . After defuzzification, the aggregate score is 63.38. Repeating this aggregation method for all experts’ results yields the final aggregated scores for each threat scenario based on the risk assessment criteria. These scores, rounded to the nearest integer, are presented in Table 12.

3.2.3. Risk Ranking Based on the CRITIC-TOPSIS

The evaluation matrix was constructed using the scores from Table 12. Following data normalization, the CRITIC weights for risk assessment indicators were computed using the CRITIC method. The results are summarized in Table 13.
This study develops an index system based on four primary criteria for airborne network information security risk assessment. The CRITIC method is employed to calculate the weights. Results from Table 13 indicate that threat conditions are the highest weight among the criteria layer, followed by assets, vulnerabilities, and security measures. An analysis of these four components is as follows:
  • Vulnerabilities: B 4 and B 6 have the lowest weights among the 16 evaluation indicators, and B 5 has a higher weight than these two, indicating that B 5 is the top priority risk factor in vulnerability assessment.
  • Security measures: only B 16 is considered, which mainly assesses the effectiveness of existing security measures, not the key factors that directly affect the occurrence of threats; thus, its weight is relatively small.
  • Assets: B 2 , B 1 , and B 3 increase in weight in turn. For airborne network security assets, availability is especially important.
  • Threat conditions: the weights of the indicators are much higher than those of other levels. In particular, B 12 and B 11 have extremely high weights, which emphasizes that these threat conditions may pose significant threats to the security of airborne networks. Indicators such as B 7 and B 10 are also crucial, but their impacts are relatively small compared with those of other threats.
The CRITIC weights of the 16 evaluation indicators in Table 13 are integrated into the decision-making matrix. The TOPSIS method is then applied to calculate the PIS and NIS, as well as the distances between each threat scenario and these reference points. The closeness to the ideal solution is subsequently determined. Scenarios exhibiting smaller positive distances and larger negative distances from the ideal solution signify lower risks, while the converse indicates higher risks. Therefore, threat scenarios are ranked according to their proximity to the ideal solution, with the CRITIC-TOPSIS assessment ranking results presented in Table 14.
Based on the ranking results of the threat scenarios, TS4 is the most significant. In this scenario, attackers exploit vulnerabilities in packet filtering or rate limiting of the aircraft gateway, launching DoS attacks on the airborne network or tampering with aircraft network services, directly threatening the core assets of the airborne network and impacting the flight safety of civil aircraft.

4. Comparison Analysis

To address the construction of the airborne network risk assessment index system, the threat scenario assessment results of the original airborne network risk assessment index system [17] are compared with those of the improved index system, which integrates the STPA-Sec method discussed in this paper. The same expert panel was invited for scoring, with the CRITIC-TOPSIS method employed for assessment. The comparative assessment results are illustrated in Figure 8.
As depicted in Figure 8, the original index system ranks threat scenarios as TS6 > TS4 > TS3 > TS2 > TS5 > TS1, which is consistent with the results obtained using the method in this study. Differences primarily arise in the ranking of TS4 and TS6. TS4’s main threats include denial of service attacks and tampering with aircraft network services, whereas TS6’s principal threat pertains to hijacking maintenance services on the aircraft network. In the context of airborne network information security, denial attacks may disrupt operations; however, pilots can manage such situations through contingency plans. Tampering with aircraft network services may invalidate specific communication commands issued to pilots, while hijacking maintenance services may obstruct fault information from reaching pilots. Following discussions with experts, it is agreed that although TS6’s hijacking threat possesses a higher impact, TS4’s dual threats may lead to cascading consequences. Thus, characterizing TS4’s risk as higher than that of TS6 is deemed more appropriate. This highlights the significance of refining threat-related indicators within the evaluation index system for assessing risks associated with threat scenarios.
To verify the effectiveness and feasibility of our proposed information security risk assessment model, we conducted a closeness degree comparison analysis with several other methods discussed in the introduction. As illustrated in Figure 9, the ranking trend of threat scenarios identified by this method aligns with that of other evaluation methods. Scenarios TS4 and TS6 present the highest risks, as they are related to aircraft networks and related services, thereby posing significant flight safety risks. In contrast, TS2, which pertains to the open cabin network and excludes core aircraft network assets, presents fewer safety concerns. Scenarios TS1, TS3, and TS5, associated with the maintenance network, are less accessible to passengers and less likely to be targeted by authorized maintenance personnel; thus, they are ranked in the middle, consistent with actual conditions. This supports the accuracy of our method in identifying risks across various threat scenarios.
The proposed method also demonstrates ranking differentiation due to its capacity to objectively calculate indicator weights through the CRITIC method, thereby enhancing objectivity and accuracy. In Figure 9, CRITIC-TOPSIS reveals higher closeness degrees across multiple threat scenarios, particularly in TS1, TS4, and TS5. This suggests it provides more precise and reliable risk assessment results for specific threat scenarios. Compared to other methods, its curve exhibits smaller fluctuations, reflecting more stable evaluation results that are less influenced by scenario changes. Overall, the improved STPA-TOPSIS method shows significant advantages in terms of accuracy and stability in risk assessment.
Figure 10 and Table 15 compare different methods. The similar trends show that our method is reliable and effective for risk assessment, offering decision-makers more accurate and credible results for wiser decisions.
From the comparative experiments in three ways, TS2 consistently has the lowest risk ranking, while TS4 and TS6 have the highest. This aligns with other methods, proving the consistency and validity of our approach.

5. Conclusions and Future Work

This article presents an information security risk assessment method based on an improved STPA-TOPSIS framework, specifically addressing the characteristics of airborne networks, and analyzes it using a simplified airborne network system as an example. The following conclusions have been drawn:
First, the STPA-Sec method identifies unsafe control behaviors and derives threat conditions for airborne network components, establishing the foundation for the subsequent risk assessment index system.
Second, the risk assessment model based on the TOPSIS method can intuitively calculate and rank the risks of various threat scenarios within the airborne network. The results indicate that the TS4 threat scenario, which has the strongest correlation with the aircraft network, presents the highest level of risk.
During the assessment, the index system is developed in accordance with national standards for information security risk assessment. This system considers four aspects: assets, threat conditions, vulnerabilities, and security measures. To balance the subjectivity of expert decisions with the objectivity of assessment data, this paper employs the CRITIC method to determine the weights of assessment indicators, enabling a comprehensive assessment of airborne network security risks. Comparative analysis demonstrates that the improved STPA-TOPSIS method is effective in evaluating airborne network information security risks.
The confidentiality of typical airborne network systems and data prevents the disclosure of detailed architecture and complexity in this paper. Consequently, the risk assessment and method validation were based on the simplified airborne network model from DO-356A. To further advance this research, the research team plans to develop an airborne network penetration testing simulation platform. This platform will be used to simulate airborne network architectures and communication data, enabling more in-depth research in this area.
The future research directions of this paper focus on information security assessment methods for airborne networks across multiple flight phases and real-time dynamic threat detection methods. For the former, the research team will combine the methods proposed in this paper with a focus on the operational status of network components and external threats during different flight phases to provide support for subsequent protective measures. For the latter, the team plans to build a penetration-testing simulation platform for airborne networks. By using real-time dynamic network traffic and device status data from aircraft operations, the team will conduct dynamic risk assessments and real-time threat detection research.

Author Contributions

Conceptualization, K.W.; methodology, K.W. and M.Z.; resources, K.W.; data curation, M.Z. and Y.H.; writing—original draft preparation, Y.H.; writing—review and editing, M.Z. and L.Z.; visualization, M.Z.; supervision, K.W.; project administration, K.W. and J.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Program No. U2133203) and the Education Commission Scientific Research Project of Tianjin (2022KJ081).

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Acknowledgments

All the authors would like to thank the editors and reviewers for their contributions to our manuscript.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are employed in the study:
STPASystem-theoretic process analysis
TOPSISTechnique for order preference by similarity to ideal solution
CRITICCriteria importance through intercriteria correlation
PISPositive ideal solution
NISNegative ideal solution
UCAsUnsafe control actions

References

  1. Aeronautical Radio Inc. Avionics Full-Duplex Switched (AFDX) Ethernet: ARINC 664 P7. USA. Available online: https://aviation-ia.sae-itc.com/standards/arinc664p7-1-664p7-1-aircraft-data-network-part-7-avionics-full-duplex-switched-ethernet-network (accessed on 1 September 2009).
  2. Sulaman, S.M.; Beer, A.; Felderer, M.; Höst, M. Comparison of the FMEA and STPA safety analysis methods—A case study. Softw. Qual. J. 2019, 27, 349–387. [Google Scholar] [CrossRef]
  3. Wang, J.; Qi, M.; Liu, S.; Zhao, D. Comprehensive safety assessment of a hydrogen liquefaction system based on an integrated system-theoretic process analysis (STPA) and best-worst method (BWM). Int. J. Hydrogen Energy 2024, 66, 479–489. [Google Scholar] [CrossRef]
  4. Oginni, D.; Camelia, F.; Chatzimichailidou, M.; Ferris, T.L. Applying System-Theoretic Process Analysis (STPA)-based methodology supported by Systems Engineering models to a UK rail project. Saf. Sci. 2023, 167, 106275. [Google Scholar] [CrossRef]
  5. Zhang, S.; Tang, T.; Liu, J. A hazard analysis approach for the SOTIF in intelligent railway driving assistance systems using STPA and complex network. Appl. Sci. 2021, 11, 7714. [Google Scholar] [CrossRef]
  6. Fleming, C. Introduction to STPA-Sec. In Systems Engineering for the Digital Age: Practitioner Perspectives; Wiley: Hoboken, NJ, USA, 2023; pp. 489–505. [Google Scholar]
  7. Salgado, M.L.; de Sousa, M.S. Cybersecurity in aviation: The STPA-sec method applied to the TCAS security. In Proceedings of the 2021 10th Latin-American Symposium on Dependable Computing (LADC), Florianópolis, Brazil, 22–26 November 2021; pp. 1–10. [Google Scholar]
  8. Guskova, N.; Chopart, M.; Kraus, J. EASA Part IS in U-Space Operations: Is System-Theoretic Process Analysis for Security Sufficient to Meet Information Security Risk Assessment Requirements? Procedia Comput. Sci. 2025, 253, 2448–2457. [Google Scholar] [CrossRef]
  9. Sahay, R.; Estay, D.S.; Meng, W.; Jensen, C.D.; Barfod, M.B. A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. Comput. Secur. 2023, 128, 103179. [Google Scholar] [CrossRef]
  10. Li, Y.; Huang, C.; Liu, Q.; Zheng, X.; Sun, K. Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system. Comput. Secur. 2024, 142, 103890. [Google Scholar] [CrossRef]
  11. Li, W.; Liang, Y.; Wang, W.; Jin, X.; Kong, P.; Jiang, Z.; Shao, L. Research on security risk assessment based on the improved FAHP. IOP Conf. Ser. Mater. Sci. Eng. 2020, 719, 012008. [Google Scholar] [CrossRef]
  12. Shirvani, S.; Baseri, Y.; Ghorbani, A. Evaluation framework for electric vehicle security risk assessment. IEEE Trans. Intell. Transp. Syst. 2023, 25, 33–56. [Google Scholar] [CrossRef]
  13. Tsai, H.Y.; Huang, Y.L. An analytic hierarchy process-based risk assessment method for wireless networks. IEEE Trans. Reliab. 2011, 60, 801–816. [Google Scholar] [CrossRef]
  14. Sato, R.; Kawaguchi, H.; Nakatani, Y. Malcoda: Practical and Stochastic Security Risk Assessment for Enterprise Networks. IEEE Trans. Dependable Secur. Comput. 2024, 22, 1383–1399. [Google Scholar] [CrossRef]
  15. Dong, H.; Zhao, J.; Yang, X.; Yang, K. Combination of D-AHP and Grey Theory for the Assessment of the Information Security Risks of Smart Grids. Math. Probl. Eng. 2020, 1, 3517104. [Google Scholar] [CrossRef]
  16. Li, J.; Yan, L.; Wang, J.; Fu, T. Research on network security risk assessment method based on improved AHP. J. Phys. Conf. Ser. 2021, 1828, 012115. [Google Scholar] [CrossRef]
  17. Wang, K.; Hong, Y.; Li, C. Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS. Comput. Mater. Contin. 2024, 80, 1123–1142. [Google Scholar] [CrossRef]
  18. Alhakami, W. Computational study of security risk evaluation in energy management and control systems based on a fuzzy MCDM method. Processes 2023, 11, 1366. [Google Scholar] [CrossRef]
  19. Tian, C.; Song, M.; Tian, J.; Xue, R. Evaluation of Air Combat Control Ability Based on Eye Movement Indicators and Combination Weighting GRA-TOPSIS. Aerospace 2023, 10, 437. [Google Scholar] [CrossRef]
  20. Alshahrani, H.M.; Alotaibi, S.S.; Ansari, M.T.J.; Asiri, M.M.; Agrawal, A.; Khan, R.A.; Mohsen, H.; Hilal, A.M. Analysis and ranking of IT risk factors using fuzzy TOPSIS-based approach. Appl. Sci. 2022, 12, 5911. [Google Scholar] [CrossRef]
  21. Wu, H.; Liu, S.; Wang, J.; Yang, T. Construction safety risk assessment of bridges in the marine environment based on CRITIC and TOPSIS models. J. Coast. Res. 2020, 108, 206–210. [Google Scholar] [CrossRef]
  22. Baylan, E.B. A novel project risk assessment method development via AHP-TOPSIS hybrid algorithm. Emerg. Sci. J. 2020, 4, 5. [Google Scholar] [CrossRef]
  23. Awodi, N.J.; Liu, Y.K.; Ayo-Imoru, R.M.; Ayodeji, A. Fuzzy TOPSIS-based risk assessment model for effective nuclear decommissioning risk management. Prog. Nucl. Energy 2023, 155, 104524. [Google Scholar] [CrossRef]
  24. Borges, S.F.D.S.; Belderrain, M.C.N.; Junior, M.M.C.; Castilho, D.S. Integration of STPA and TOPSIS fuzzy methods for risk analysis in aerospace projects. Int. J. Decis. Sci. Risk Manag. 2022, 10, 212–226. [Google Scholar]
  25. Tian, W.; Zhou, X.; Yin, J.; Li, Y.; Zhang, Y. Identification of Key Risk Hotspots in Mega-Airport Surface Based on Monte Carlo Simulation. Aerospace 2024, 11, 254. [Google Scholar] [CrossRef]
  26. Li, X.; Wang, K.; Liu, L.; Xin, J.; Yang, H.; Gao, C. Application of the entropy weight and TOPSIS method in safety evaluation of coal mines. Procedia Eng. 2011, 26, 2085–2091. [Google Scholar] [CrossRef]
  27. Çelikbilek, Y.; Tüysüz, F. An in-depth review of theory of the TOPSIS method: An experimental analysis. J. Manag. Anal. 2020, 7, 281–300. [Google Scholar] [CrossRef]
  28. Liu, Z.; Zhao, Y.; Liu, P. An integrated FMEA framework considering expert reliability for classification and its application in aircraft power supply system. Eng. Appl. Artif. Intell. 2023, 123, 106319. [Google Scholar] [CrossRef]
  29. Maheve, M.; Hariram, S. System Safety Enhancement using Fault Tree Models. In Proceedings of the 2022 Annual Reliability and Maintainability Symposium (RAMS), Tucson, AZ, USA, 24–27 January 2022; pp. 1–4. [Google Scholar]
  30. Georgiadou, A.; Mouzakitis, S.; Askounis, D. Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework. Sensors 2021, 21, 3267. [Google Scholar] [CrossRef]
  31. Kumar, M. A novel weakest t-norm based fuzzy fault tree analysis through qualitative data processing and its application in system reliability evaluation. J. Intell. Syst. 2019, 29, 977–993. [Google Scholar] [CrossRef]
  32. Li, L.; Mo, R. A Comprehensive Decision-Making Approach Based on Hierarchical Attribute Model for Information Fusion Algorithms’ Performance Evaluation. Math. Probl. Eng. 2014, 1, 124156. [Google Scholar] [CrossRef]
  33. RTCA DO-356A; Airworthiness Security Methods and Considerations. Radio Technical Commission for Aeronautics: Washington, DC, USA, 2018.
  34. Schlegelmilch, B.W. Applying a Systems-Based Approach to Crewed Space Architecture Safety Analysis. Ph.D. Thesis, The George Washington University, Washington, DC, USA, 2024. [Google Scholar]
  35. RTCA DO-326; Airworthiness Security Process Specification. Radio Technical Commission for Aeronautics: Washington, DC, USA, 2014.
  36. De Souza, N.P.; César, C.D.A.C.; de Melo Bezerra, J.; Hirata, C.M. Extending STPA with STRIDE to identify cybersecurity loss scenarios. J. Inf. Secur. Appl. 2020, 55, 102620. [Google Scholar] [CrossRef]
  37. GB/T 20984-2022; Information Security Technology-Risk Assessment Method for Information Security. Standardization Administration of China: Beijing, China, 2022; pp. 6–7.
Figure 1. Airborne network information security assessment flow chart.
Figure 1. Airborne network information security assessment flow chart.
Aerospace 12 00442 g001
Figure 2. Membership function.
Figure 2. Membership function.
Aerospace 12 00442 g002
Figure 3. The process of aggregating expert opinions based on T ω .
Figure 3. The process of aggregating expert opinions based on T ω .
Aerospace 12 00442 g003
Figure 4. Flow chart of the TOPSIS method.
Figure 4. Flow chart of the TOPSIS method.
Aerospace 12 00442 g004
Figure 5. The architecture of airborne networks.
Figure 5. The architecture of airborne networks.
Aerospace 12 00442 g005
Figure 6. The security interaction structure model of the airborne network.
Figure 6. The security interaction structure model of the airborne network.
Aerospace 12 00442 g006
Figure 7. Airborne network security risk assessment index system.
Figure 7. Airborne network security risk assessment index system.
Aerospace 12 00442 g007
Figure 8. Comparison of order closeness difference of different methods.
Figure 8. Comparison of order closeness difference of different methods.
Aerospace 12 00442 g008
Figure 9. Comprehensive ranking of threat scenarios by different methods [20,21,22,25].
Figure 9. Comprehensive ranking of threat scenarios by different methods [20,21,22,25].
Aerospace 12 00442 g009
Figure 10. Comparison of different methods [21,24,27].
Figure 10. Comparison of different methods [21,24,27].
Aerospace 12 00442 g010
Table 1. Triangular fuzzy operation rules based on T ω .
Table 1. Triangular fuzzy operation rules based on T ω .
OperationsFuzzy Expression
Addition A T ω B = b 1 + b 2 max b 1 a 1 , b 2 a 2 , b 1 + b 2 , b 1 + b 2 + max c 1 b 1 , c 2 b 2 ; b 1 + b 2 max b 1 a 1 , b 2 a 2 , b 1 + b 2 , b 1 + b 2 + max c 1 b 1 , c 2 b 2
Subtraction A T ω B = b 1 b 2 max b 1 a 1 , c 2 b 2 , b 1 b 2 , b 1 b 2 + max c 1 b 1 , b 2 a 2 ; b 1 b 2 max b 1 a 1 , c 2 b 2 , b 1 b 2 , b 1 b 2 + max c 1 b 1 , b 2 a 2
Multiplication λ T ω A = ( λ a 1 , λ b 1 , λ c 1 ; λ a 1 , λ b 1 , λ c 1 )
Table 2. System-level losses of airborne networks.
Table 2. System-level losses of airborne networks.
System-Level LossesDescription
L-1Multiple people casualties
(suffering disaster losses)
L-2Violation of navigation operation restrictions
(navigation operation failure)
L-3Violation of aircraft operation restrictions
(aircraft control failure)
L-4Loss of communication integrity
(failure of aircraft communication equipment)
Table 3. System-level hazards of airborne networks.
Table 3. System-level hazards of airborne networks.
System-Level HazardDescriptionPotential System-Level Losses
H-1Loss of aircraft controlL-1, L-2, L-3
H-2Aircraft unable to receive or transmit correct dataL-2
H-3Illegal input or data tamperingL-1, L-2, L-3, L-4
H-4Illegal access to aircraft systemsL-1, L-2, L-3, L-4
H-5Faulty data loadingL-1, L-2, L-3, L-4
Table 4. Analysis of UCAs of the airborne network.
Table 4. Analysis of UCAs of the airborne network.
Control ActionProviding Incorrect Control ActionNot Providing the Control Action Required for SafetyProviding Control Action with Incorrect TimingProviding Control Action That Is Too Long or Too Short
Provisioning of critical resourcesU1: Providing incorrect cabin resources after passenger requests.U2: No cabin resources provided after passenger requests.U3: Cabin resources not provided within the restricted time after passenger requests.U4: Providing cabin resources before passenger requests.
Critical resource allocationU5: Allocating wrong resources after identifying critical resource requests.U6: Critical resources not allocated after identifying the request for critical resources.U7: After recognizing the critical resource request, resource allocation does not happen within the restricted time.U8: Critical resources are allocated at will before the request for critical resources is recognized.
Maintenance gateway data packet filteringU9: Incorrect filtering of data packets from the cabin network.U10: Data packets from the cabin network are not filtered after being received.N/AN/A
Maintenance gateway data packet rate limitN/AU11: The rate is not restricted after receiving data packets from the cabin network.N/AN/A
Provisioning of critical resourcesU12: Providing incorrect resources after detecting a critical resource request.U13: No resource provided after detecting a critical resource request.U14: After recognizing the critical resource request, resources were not provided within the restricted time.U15: Critical resources are provided prior to recognizing the critical resource request.
AuthenticationU16: Authentication of unauthorized personnel despite no request from maintenance personnel.U17: No authentication performed after maintenance personnel sent a login request.U18: The authentication time exceeds the limit after the maintenance personnel send a login request.U19: Maintenance personnel skip authentication before sending a login request.
Maintenance network configuration updateN/AU20: The maintenance network server is not updated after the maintenance personnel uploads the maintenance network configuration.N/AN/A
Aircraft gateway data packet filteringU21: Incorrect filtering of data packets from the maintenance network.U22: Data packets from the maintenance network are not filtered after being received.N/AN/A
Aircraft gateway data packet rate limitN/AU23: The rate is not restricted after receiving data packets.N/AN/A
Aircraft network configuration updateN/AU24: After receiving the uploaded configuration, the configuration is not updated.N/AN/A
Table 5. Examples of causal factor analysis.
Table 5. Examples of causal factor analysis.
UCATamperingDenial of ServicePrivilege Escalation
U1U1-1: Attackers maliciously tamper with cabin resources on the cabin network server, causing it to provide incorrect resources.
U1-2: Attackers alter the configuration of the cabin network server, leading it to supply the wrong cabin resources.
U1-3: Attackers use denial-of-service attacks to overload cabin network servers, causing them to provide incorrect cabin resources.U1-4: Attackers gain system control through privilege escalation and supply incorrect cabin resources.
U2U2-1: Attackers tamper with the cabin network server configuration, causing a loss of cabin resource response.U2-2: Attackers launch denial-of-service attacks, consume cabin network resources, and cause resource request packet loss.
U2-3: Attackers launch denial-of-service attacks, consume cabin network resources, and cause cabin resource packet loss.
U2-4: Attackers escalate privileges to cancel resource requests, leading to no cabin resource provisioning.
U3U3-1: Attackers tamper with the cabin network server configuration, causing excessive response time for cabin resource requests.U3-2: Attackers launch denial-of-service attacks, consume cabin network resources, and cause excessive propagation delay of resource request packets.
U3-3: Attackers launch denial-of-service attacks, consume cabin network resources, and cause excessive propagation delay of cabin resource packets.
U3-4: Attackers use privilege escalation to delay resource request processing, preventing cabin resource provisioning within the restricted time.
U4U4-1: Attackers tamper with the cabin network server configuration, causing it to supply cabin resources before passenger requests.U4-2: Attackers overload cabin network servers through denial-of-service attacks, causing system chaos and providing cabin resources before passenger requests.U4-3: Attackers gain control of the airborne network system through privilege escalation, enabling them to supply cabin resources before passenger requests.
Table 6. The threat conditions of the airborne network.
Table 6. The threat conditions of the airborne network.
Serial NumberThreat ConditionsDescription
T1Denial of cabin serviceCabin network packet loss or latency
T2Tampering with cabin servicesCabin network server not working or malfunctioning
T3Refusal of maintenance servicesMaintenance network packet loss or latency
T4Tampering with maintenance servicesMaintenance network server not working or malfunctioning
T5Rejection of aircraft servicesAircraft network packet loss or latency
T6Tampering with aircraft servicesAircraft network server not working or malfunctioning
T7Tampering with the configuration of the maintenance gatewayMaintenance gateway not working or malfunctioning
T8Hijacking cabin services residing on the maintenance networkElevation of privileges in the cabin network
T9Hijacking maintenance services residing on the aircraft networkElevation of privileges in the maintenance network
Table 7. The main threat scenarios of the airborne network.
Table 7. The main threat scenarios of the airborne network.
Serial NumberAssetsVulnerabilityThreat ConditionsSecurity Measures
TS1Maintenance services;
Maintenance network
Maintenance gateway packet filtering vulnerability;
Maintenance gateway rate limiting vulnerability
Denial of cabin service;
Tampering with cabin services
Maintenance gateway packet filtering;
Maintenance gateway rate limiting
TS2Cabin services;
Cabin network
Cabin service authentication vulnerabilityRefusal of maintenance services;
Tampering with maintenance services
Cabin service authentication
TS3Maintenance gatewayMaintenance gateway weak passwordRejection of aircraft servicesMaintenance gateway password protection
TS4Aircraft services;
Aircraft network
Aircraft gateway packet filtering vulnerability;
Aircraft gateway rate limiting vulnerability
Tampering with aircraft services;
Tampering with the configuration of the maintenance gateway
Aircraft gateway packet filtering;
Aircraft gateway rate limiting
TS5Cabin services;
Maintenance network
Privilege escalation vulnerabilityHijacking cabin services residing on the maintenance networkMaintenance network signature authentication
TS6Maintenance services;
Aircraft network
Privilege escalation vulnerabilityHijacking maintenance services residing on the aircraft networkAircraft network signature authentication
Table 8. Scoring criteria for evaluation panel experts.
Table 8. Scoring criteria for evaluation panel experts.
TitleEducation LevelWork ExperienceScore
ProfessorPostdoctoral 20 5
Associate ProfessorDoctoral 18 20 4
Intermediate EngineerMaster 15 17 3
Junior EngineerBachelor 9 15 2
InternAssociate Degree 10 1
Table 9. Introduction to the evaluation panel experts.
Table 9. Introduction to the evaluation panel experts.
ExpertField of EmploymentTitleEducation LevelLength of ServiceScoreWeight
1SupplierSenior engineerMaster14914.7%
2UniversityProfessorDoctor231524.6%
3Research instituteResearcherDoctor181423.0%
4ManufactureSenior ProfessionalMaster211321.3%
5UniversityAssociate ProfessorDoctor111016.4%
Table 10. Risk evaluation corresponds to the percentage system and triangular fuzzy numbers.
Table 10. Risk evaluation corresponds to the percentage system and triangular fuzzy numbers.
Risk AssessmentScore RangeTIFN
Extreme High (EH)(90,100](0.92, 0.95, 1.00; 0.90, 0.95, 1.00)
Very High (VH)(80,90](0.82, 0.85, 0.87; 0.80, 0.85, 0.90)
High (H)(70,80](0.72, 0.75, 0.77; 0.70, 0.75, 0.80)
Moderately High (MH)(60,70](0.62, 0.65, 0.67; 0.60, 0.65, 0.70)
Upper Medium (UM)(50,60](0.52, 0.55, 0.57; 0.50, 0.55, 0.60)
Medium (M)(40,50](0.42, 0.45, 0.47; 0.40, 0.45, 0.50)
Lower Medium (LM)(30,40](0.32, 0.35, 0.37; 0.30, 0.35, 0.40)
Low (L)(20,30](0.22, 0.25, 0.27; 0.20, 0.25, 0.30)
Very Low (VL)(10,20](0.12, 0.15, 0.17; 0.10, 0.15, 0.20)
Extremely Low (EL)(0,10](0.02, 0.05, 0.07; 0.00, 0.05, 0.10)
Table 11. The assessment results of B 6 for TS5.
Table 11. The assessment results of B 6 for TS5.
ExpertExpert Assessment Results
1UM (0.52, 0.55, 0.57; 0.50, 0.55, 0.60)
2MH (0.62, 0.65, 0.67; 0.60, 0.65, 0.70)
3H (0.72, 0.75, 0.77; 0.70, 0.75, 0.80)
4MH (0.62, 0.65, 0.67; 0.60, 0.65, 0.70)
5MH (0.62, 0.65, 0.67; 0.60, 0.65, 0.70)
Table 12. Risk assessment score sheet by the experts.
Table 12. Risk assessment score sheet by the experts.
Threat Scenario B 1 B 2 B 3 B 4 B 5 B 6 B 7 B 8 B 9 B 10 B 11 B 12 B 13 B 14 B 15 B 16
TS150585765616560615957636461625865
TS240514657545747414243615643544556
TS344535060566051494849585849574760
TS456646069666968717065686271626969
TS547565363596355565453616155605363
TS653616167646764666561666766656367
Table 13. Risk assessment index weight of CRITIC.
Table 13. Risk assessment index weight of CRITIC.
Evaluation IndicatorVolatilityConflictAmount of InformationIndex Weigh
B 1 5.8880.4832.8443.97%
B 2 4.8750.5672.7663.86%
B 3 5.8910.6083.5845.00%
B 4 4.4610.4742.1162.95%
B 5 4.6040.4642.1382.98%
B 6 4.4610.4742.1162.95%
B 7 7.9690.4793.8185.33%
B 8 11.0750.4865.3847.51%
B 9 10.4820.4594.8146.71%
B 10 8.0420.4973.9975.58%
B 11 3.6562.2868.35611.65%
B 12 3.9832.65110.55914.73%
B 13 10.540.4494.7346.60%
B 14 3.951.4955.9058.24%
B 15 9.3040.6385.9328.27%
B 16 4.7610.5542.6383.68%
Table 14. Ranking of threat scenarios based on TOPSIS.
Table 14. Ranking of threat scenarios based on TOPSIS.
RankingThreat ScenarioPositive Distance
( D i + )
Negative Distance
( D i )
Closeness   ( ξ ( X i )
1TS42.11518.3790.897
2TS63.40615.7480.822
3TS17.07711.9360.628
4TS510.7728.2510.434
5TS315.054.1170.315
6TS218.7221.0240.121
Table 15. Comparison of different methods.
Table 15. Comparison of different methods.
Threat ScenariosTOPSISSTPA-TOPSISCRITIC-TOPSISSTPA-CRITIC-TOPSISThe Proposed Method
Analysis ResultsRankAnalysis ResultsRankAnalysis ResultsRankAnalysis ResultsRankAnalysis ResultsRank
TS10.63430.58930.56530.59830.6283
TS20.08560.11260.07860.03160.1216
TS30.23150.19750.32150.18950.3155
TS40.83120.83310.79220.88510.8971
TS50.45840.39840.41140.38740.4344
TS60.90210.80120.88610.81320.8222
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, K.; Zhang, M.; Hong, Y.; Bai, J.; Zhang, L. Airborne Network Information Security Risk Assessment Method Based on Improved STPA-TOPSIS. Aerospace 2025, 12, 442. https://doi.org/10.3390/aerospace12050442

AMA Style

Wang K, Zhang M, Hong Y, Bai J, Zhang L. Airborne Network Information Security Risk Assessment Method Based on Improved STPA-TOPSIS. Aerospace. 2025; 12(5):442. https://doi.org/10.3390/aerospace12050442

Chicago/Turabian Style

Wang, Kenian, Mingluan Zhang, Yuan Hong, Jie Bai, and Lizhe Zhang. 2025. "Airborne Network Information Security Risk Assessment Method Based on Improved STPA-TOPSIS" Aerospace 12, no. 5: 442. https://doi.org/10.3390/aerospace12050442

APA Style

Wang, K., Zhang, M., Hong, Y., Bai, J., & Zhang, L. (2025). Airborne Network Information Security Risk Assessment Method Based on Improved STPA-TOPSIS. Aerospace, 12(5), 442. https://doi.org/10.3390/aerospace12050442

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop