আমাদের কথা খুঁজে নিন

   

How Cloud Technology Could Have Tracked the Malaysia Airlines Plane

As the biggest ever hunt for a missing plane continues, many are beginning to wonder if we will ever know what happened to Malaysia Airlines flight MH370. If the plane has crashed, it has been suggested that it could take up to two years to find its wreckage.
But if MH370 had been fitted with technology that made use of the cloud it may never have been lost in the first place. Instead of relying on the combination of GPS, primary and secondary radar, and aircraft communications addressing and reporting systems (ACARS) to keep track of planes, we should be making sure they send regular flight information to the data centers in the cloud. This is a cluster of computers that provides reliable computing and storage as a service to large numbers of requests from computers with limited capabilities, such as those on board a plane or inside a mobile phone. Planes would then send information such as aviation signals and pilot conversations as a compressed digital stream efficiently through satellite networks.
We still don't know if MH370 disappeared because of a technical failure or a malicious security breach. It has been noted that the pilot or a member of the in-flight staff turned off the communication channels and used unusual flying maneuvers to avoid being detected by the primary radars on the ground and the secondary radars on board nearby planes. There are ways of responding to this scenario too.
Although transmission responders (also known as transponders) can send a unique four-digit code to identify the plane as a way to help airplanes maintain a safe distance from each other when in flight, these can be turned off by pilots. If we are now in a world in which we have to question the intentions of pilots, there are more security implications to consider.
A conceivable solution to this problem is to run a simulation of a plane's flight on the ground while it is in the air and to selectively compare the meaningful changes in information with those intermittently sent from the pilot and on board systems. This would enable people on the ground to verify information such as altitude and course in real time and to double check that all is well. In normal circumstances this system would minimize risks and increase safety of the plane and its passengers. In case of foul play on board, the system would be able to spot that the information sent from the plane was incorrect.
Spotting misinformation would be possible if we made better use of the cloud too. Using verifiable algorithms at scale we could tell that encrypted communication data on the plane is not altered by checking its mathematical hash function, which is the application of a mathematical algorithmic calculation to a set of data that will give a unique result. Any subsequent changes to the data will change the "hash value" of the data set. Hashing is used to confirm that data has not been altered.
This type of check is already used in Bitcoin verifications. Computing a large number of hash values and verifying their authenticity against fakes requires a substantial amount of computation power, so cloud computing, multi-core graphics processing units and application-specific integrated circuits, which are specially designed to do just one job and do it well, are used to enable multiple tasks to be carried out at the same time.
A specifically designed protocol such as Bitcoin relies on thousands of volunteers to use their own computers to verify computations for a small monetary return. While doing something similar to verify air traffic data would not be done for money, we might be able to call on people to give up computing power as a way of improving general flight safety for passengers since many of us fly at some point in our lives.
After switching to the cloud, traffic controllers would be able to notice abnormalities even if the pilots refused to cooperate and switched off its communication with the ground. They would be in a much better position than they are in the case of MH370. Cheating the ground or vice versa is substantially harder because parts of the data collected from the plane are produced from the cyber physical situations of the vehicle, which no one can hack.
The groundwork for this system of proactive verification is being laid already as part of an ongoing research program. The mystery surrounding flight MH370 should galvanize authorities to help find the resources and enough good will to have it fully developed and implemented.

Yijun Yu receives funding from EU, QNRF, Microsoft, RealTelecom, and Huawei. He is affiliated with IEEE and British Computing Society.
This article originally published at The Conversation UK here
The Conversation is an independent news and commentary website produced by academics and journalists, free for the public.

সোর্স: http://mashable.com

অনলাইনে ছড়িয়ে ছিটিয়ে থাকা কথা গুলোকেই সহজে জানবার সুবিধার জন্য একত্রিত করে আমাদের কথা । এখানে সংগৃহিত কথা গুলোর সত্ব (copyright) সম্পূর্ণভাবে সোর্স সাইটের লেখকের এবং আমাদের কথাতে প্রতিটা কথাতেই সোর্স সাইটের রেফারেন্স লিংক উধৃত আছে ।