Aircraft wireless network for fixed aircraft components

ABSTRACT

A method and apparatus for managing security in a wireless network for fixed aircraft components, having a wireless access point located in the aircraft and defining the boundaries of the wireless network, a wireless remote node fixedly located within the aircraft and communicating with the wireless network, and a fixed security node.

BACKGROUND OF THE INVENTION

An aircraft may include a plurality of fixed aircraft components thatgenerate data and are in communication with one or more aircraftsystems, wherein the aircraft systems receive and/or process thegenerated data to perform aircraft functions. In some instances, thedata generated by the components is communicated to the aircraft systemsby wired interconnected networks. Wireless networks may replace thewired networks of an aircraft in communicating the data generated by thefixed aircraft components to the aircraft systems.

BRIEF DESCRIPTION OF THE INVENTION

In one embodiment, the invention relates to an aircraft wireless networkfor fixed aircraft components, including a wireless access point locatedin the aircraft and defining the boundaries of the wireless network, awireless remote node fixedly located within the aircraft and configuredto communicate with the wireless network, located within the boundariesof the wireless network, and whose communication defines a radiofrequency (RF) fingerprint, and a fixed security node located within theboundaries of the wireless network, having a database of authorized RFfingerprints, and configured to receive communications of the wirelessnetwork. The security node compares the RF fingerprint of the receivedremote node communication with the database.

In another embodiment, the invention relates to a method for managingsecurity in a wireless network for fixed aircraft components, having awireless access point located in the aircraft and defining theboundaries of the wireless network, a wireless remote node fixedlylocated within the aircraft and communicating with the wireless network,and a fixed security node. The method includes receiving, in thesecurity node, a communication from the remote node, creating an RFfingerprint of the remote node based on the received communication,comparing the RF fingerprint with a database of authorized remote nodeRF fingerprints, and determining if the remote node is an authorizedremote node based on the comparison.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings:

FIG. 1 is a top down schematic view of the aircraft and wireless networkin accordance with one embodiment of the invention.

FIG. 2 is a schematic view of the wireless network and communicatingdevices in accordance with one embodiment of the invention.

DETAILED DESCRIPTION

The described embodiments of the present invention are directed to awireless network for fixed components and a method for managing securityin the wireless network, which may be used, for example, in an aircraft.While this description is primarily directed toward an aircraft wirelessnetwork for fixed components, it is also applicable to any environmentusing a wireless network for wireless radio frequency (RF)communications between fixed components. As described herein, the term“fixed” may refer to components that may be statically positioned and/orfixedly mounted to, within, and/or relative to the aircraft, itself,during aircraft operations such as taxiing and/or flight. Such fixedcomponents may be removed, for example, for maintenance and replacement,but such removal does not mean the component is not “fixed” for purposesof this description.

As illustrated in FIG. 1, an aircraft 10 may include at least onepropulsion engine, shown as a left and right engine system 12. Theaircraft 10 may further include at least one computer 14 or processingelement having at least one data storage unit or memory 16, wherein thecomputer 14 is utilized to provide for aircraft operations. Non-limitingexamples of the computer 14 or processing element may include a flightmanagement system, primary flight display system, or an autopilot orautoland system. The memory 16 may include random access memory (RAM),flash memory, or one or more different types of portable electronicmemory, etc., or any suitable combination of these types of memory.

The aircraft 10 may further include a plurality of fixed aircraftcomponents, such as line-replaceable units (LRU) 18, or modularcomponents of a vehicle or aircraft, and one or more fixed actuators 20.In the aircraft environment, LRUs 18 may be designed to operateaccording to a particular operation, interoperability, and/or formfactor standards, such as those defined by ARINC series standards. Theone or more fixed actuators 20 or actuating units may be utilized, forexample, for controlling the roll, pitch, yaw, and airspeed of theaircraft, by a pilot or another avionics system by actuating the controlsurfaces of the aircraft 10 or thrust generation of the engine systems12. In one example, the actuators 20 may be in communication with one ormore flight control systems, such as the flight management system orpilot input devices, such as a stick or yoke, and may control thesurfaces and engine by electronic transmission signals and controlcomputers in a “fly-by-wire” system.

The illustrated aircraft 10 embodiment is merely one non-limitingexample of an aircraft 10 that may be used in embodiments of theinvention described herein. Particularities of the illustrated aircraft10 embodiment, including relative size, length, number of engines, typeof engines, and location of various components are not germane to theembodiments of the invention, unless otherwise noted.

In some example components, such as the LRUs 18, the components may beremovably fixed to the aircraft for maintenance, diagnostics, and/orrepair purposes, but statically fixed during, for example, flight.Additionally, while LRUs 18, and actuators 20 may be described, any datagenerating and/or data receiving components fixed relative to anaircraft may be included as embodiments of the invention as fixedcomponents. For example, systems such as a flight management system,primary flight display, cockpit display system, autopilot, and/orautoland systems may each by be considered fixed components, as usedherein.

The LRUs 18 and/or actuators 20 may include, for example entirelycontained systems, sensors, radios, or other auxiliary equipment tomanage and/or operate aircraft functions and may generate data duringoperation that may be communicated to the computer 14 or processingelement, for processing and/or storing in the memory 16. Further, theLRUs 18 and/or actuators 20 may receive processed data and/or controlsignals from the computer 14 or processing element for operating the LRU18 and/or actuator 20. While LRUs 18 and actuators 20 are provided asexamples of fixed aircraft components, additional aircraft componentsmay be included that provide and/or receive data from at least onecomputer 14 or processing element.

The aircraft 10 may further include additional fixed componentsconfigured to provide for wireless communication between the computer 14and/or aircraft components 18, 20. For example, as shown, the aircraft10 may comprise at least one fixed wireless access point 22 located inthe aircraft, having at least one antenna 24, and defining theboundaries of a wireless network, and at least one wireless remote node26 fixedly located within the aircraft 10, also having at least oneantenna 28, and configured to communicate with the wireless access point22 and/or the wireless network defined by the wireless access point 22.Each of the respective antennas 24, 28 may be configured and/or tailoredto interact with the defined wireless network RF signal. Non-limitingexamples of, the RF signal of the wireless network may include wirelessstandards defined by organizations or groups, such as IEEE 802.11wireless signals, IEEE 802.15.4 signals, ultra wideband RF signals,SAE/ARINC requirements, particular RF bands such as 2.4 GHz or 5 GHz, orband ranges specifically assigned for aircraft use.

The aircraft may further include at least one security node 30, fixedrelative to the aircraft 10, having at least one antenna 32, andconfigured to interact with the communications of the wireless networkdefined by the wireless access point 22. In this sense, the securitynode 30 may receive, or “listen” to communications of at least oneaccess point 22 and/or remote node 26, but may not send or “broadcast”communications on the wireless network in response to the receivedcommunication. The security node 30 may be configured such that it maygenerate, process, read, and/or create a representation indicative ofthe RF signal waveform for the source of the communications, such as aremote node 26 or access point 22. In this example, the representationindicative of the RF signal waveform may be unique and/or representativeof a particular remote node 26 and/or access point 22, and may bedescribed as an “RF fingerprint.” As used herein, the RF fingerprint mayinclude characteristics of the signal and/or waveform for eachrespective component 22, 26, not characteristics of the data carried bythe communication. The RF fingerprint may include at least one of signalstrength, signal direction of arrival, signal rise time, signal falltime, and/or frequency. Additional RF fingerprint characteristics of theRF signal or waveform may be included, such as a signal radio frequency,a power level, a repeat period, and/or the duration of the signal. Inone example, the RF fingerprint created may optionally includeinformation created, processed, or extrapolated from data received inthe communication, such as a sending network address. Additionalinformation from data received in the communication may be included inthe RF fingerprint to identify a node 26.

In one example embodiment of the invention, the security node 30 may beconfigured to distinguish between and/or identify “authorized” or“trusted” remote nodes 26 of the wireless network and “unauthorized” or“untrusted” remote nodes 26. As used in this sense, an “authorized” nodeis a node that has been identified as an expected participant in thewireless network of the aircraft 10, either prior to operation or duringoperation. The security node 30 may provide functionality of determiningif a particular remote node 26 is trusted or untrusted, as describedbelow. While terms such as “authorized” and “untrusted” are used asdescribed, alternative language may be included to describe theauthority of access by a remote node 26. Additional non-limitingexamples of authority of access language may includeapproved/unapproved/disapproved, granted/denied, permitted/unpermitted,etc.

As shown, the one or more aircraft components 18, 20 may becommunicatively coupled with a respective wireless remote node 26, suchthat data may be uni-directionally and/or bi-directionally communicatedbetween each respective component 18, 20, via the wireless networkcommunication of the remote node 26 and the access point 22, to and/orfrom the computer 14 for processing and/or the memory 16 for storing. Inembodiments wherein one remote node 26 is communicatively coupled withmultiple components 18, 20, the remote node 26 may, for example, includea data concentrator combining the communications for each respectivecomponent 18, 20 into a single wireless communication. In anotherembodiment, one or more remote nodes 26 may operate as a wireless relaypoint, relay node, or data repeater, wherein the remote node 26 mayoperate to extend communication from another component 18, 20 or remotenode 26 to the wireless network of the aircraft 10. Each of the wirelessaccess point 22, wireless remote nodes 26, and/or communications of therespective access point 22 or node 26 may further define an RFfingerprint that may be unique to each respective access point 22, node26, communications of the access point 22, and/or communications of thenode 26. While FIG. 1 illustrates one non-limiting example of aconfiguration of the access point 22, components 18, 20, remote nodes26, and security node 30, many possible alternative configurations maybe included. Any of the aforementioned components 18, 20, 22, 26, 30 maybe alternatively located and/or fixed within the aircraft 10, andadditional or fewer components 18, 20, 22, 26, 30 may be included. Forexample, each remote node 26 may have one or more components 18, 20communicatively coupled, more than one interconnected wireless accesspoints 22 may define the wireless network to provide broad networkcoverage over the entire aircraft 10, and one or more security nodes 30may be located through the aircraft 10 to receive networkcommunications.

FIG. 2 illustrates a schematic view of a wireless network 34 (whoseboundaries are shown in dotted line) defined by at least one accesspoint 22 and a plurality of “authorized” or “trusted” remote nodes 26 inaccordance with one embodiment of the invention. As shown, at least aportion of each of the remote nodes 26, for example, a portion havingthe antenna 28, is located within the boundaries of the wireless network34 range. Also shown is at least one security node 30 having at least aportion, for example, a portion having the antenna 32, is located withinthe boundaries of the wireless network 34 range, and including memory36. The example configuration shown further includes at least one“unauthorized” node, illustrated as an untrusted device 40, and havingat least one antenna 42.

As shown, the security node 30 may further include memory 36 configuredto store data related to or indicative of RF fingerprints of thewireless network 34, for example, the signal radio frequency, the powerlevel, the repeat period of the signal, the duration of the signal,and/or the direction of the signal. For example, the memory 36 mayinclude a database of authorized and/or unauthorized RF fingerprints forthe wireless network. The database may be predefined prior to aircraftservice, and may be further updatable during operation and/ormaintenance service. While the database is described as includingauthorized and/or unauthorized RF fingerprints for the wireless network,embodiments of the database may include authorized and/or unauthorizedRF fingerprint ranges for the wireless network. In this sense, an RFfingerprint “range” may be predefined to include a known or unknownvariance in the RF fingerprint, for example, that may occur when the RFfingerprint traverses through or experiences different interferenceand/or mediums, such as passengers of the aircraft 10, cargo of theaircraft 10, varying fuel levels, environmental conditions, altitude,and/or humidity. In this example, slight variances of the RF fingerprintdue to interference and/or medium may still fall within, for example, anauthorized RF fingerprint range. Additional differences in interferenceand/or mediums may be included.

The security node 30 is further shown communicatively coupled with thehuman interface device 38, which may be configured to provide indicia toa user, such as an alert, sound, or light, based on the communication.The human interface device 38 may be removably positioned within theaircraft 10 such that a user, such as a pilot or other airline employeemay interact with, or view the indicia, as needed. While the humaninterface device 38 is illustrated outside of the wireless network 34,embodiments of the invention may include a human interface device 38that includes an antenna, and is communicatively coupled with thesecurity node 30 by way of the wireless network 34. Additionally, ifmultiple security nodes 30 are included as part of the wireless network34, each may be communicatively coupled with the human interface device38, or may be coupled with multiple human interface devices 38.

The embodiments of the invention described herein describe a method andapparatus configured to manage the security of a wireless network 34 forfixed components 18, 20, 26, 24 of an aircraft 10. During operation ofthe aircraft 10, which may include non-flight operations such astaxiing, maintenance, etc., the security node 30 may receivecommunications from one or more remote nodes 26, 40 of the wirelessnetwork 34. The security node 30 creates an RF fingerprint of eachremote node 26, 40 based on the received communication, as describedabove, and may compare the RF fingerprint with the memory 36 and/ordatabase of authorized remote node RF fingerprints, or range of RFfingerprints, as explained above, of the security node 30. The securitynode 30 may then determine if the remote node 26, 40 is an authorizedremote node 26 that is expected to be communicating with, or as part of,the wireless network 34, based on the comparison.

In the example shown, communication from each of the “authorized” remotenodes 26 will be received by the security node 30, which will in turncreate an RF fingerprint for each respective “authorized” remote node26. Each RF fingerprint will be compared against the authorized RFfingerprint database of the security node 30, wherein a comparison ofeach RF fingerprint against the database will indicate each of the“authorized” remote nodes 26 are, indeed, authorized to be part of thewireless network 34. Conversely, when the security node 30 receivescommunication from the untrusted device 40 on the wireless network 34and creates an RF fingerprint for the device 40, a comparison of the RFfingerprint with the database of authorized devices will indicate theuntrusted device 40 is not authorized to be part of the wireless network34. The sequence described is for exemplary purposes only and is notmeant to limit the method or functionality of the wireless network 34 orsecurity node 30 in any way as it is understood that the portions of themethod may proceed in a different logical order, additional orintervening portions may be included, or described portions of themethod may be divided into multiple portions, or described portions ofthe method may be omitted without detracting from the described method.

Based on the determination that an untrusted device 40 is attempting tocommunicate on the wireless network 34 of the aircraft 10, the securitynode 30 may take further steps to mitigate risks of unauthorized access.For example, the security node 30 may communicate with the humaninterface device 38 to provide indication to a pilot or employee that anuntrusted device 40 is attempting to communicate with the wirelessnetwork 34. Embodiments of the invention may allow the human interfacedevice 38 to provide feedback from the pilot of employee to either“authorize” the untrusted device 40. Alternatively, the security node 30may log the attempted access of the untrusted device 40 to memory 36.Embodiments of the invention may further include logging any authorizedor unauthorized access of the wireless network 34 to memory 36, orcommunicating with the human interface device 38 to provide indicationof any and/or all of the authorized or unauthorized access of thewireless network 34.

In yet another example of embodiments of the invention, if a comparisonof an RF fingerprint created from communication of an remote node 26determines that the RF fingerprint is substantially similar to anauthorized remote node 26 RF fingerprint, yet not within a tolerance ofthe comparison or RF fingerprint range defined, the security node 30 maybe capable of communicating with the human interface device 38 toprovide indication of a possible authorized remote node 26 communicationto a pilot or employee. In this example, the human interface device 38may receive an input from the pilot or employee to authorize or grantfor example, full access, limited access, and/or temporary access to theremote node 26, which in turn will update the memory 36 of the securitynode 30 to identify the RF fingerprint of the remote node 26 as anauthorized device. For example, the database entry for that remote node26 may be overwritten with the current RF fingerprint created by thesecurity node 30, or the database entry for that remote node 26 may beupdated with a new or different predetermined variance range for thestored RF fingerprint that includes the current RF fingerprint.Alternatively, the security node 30 may include the overwriting orupdating functionality described without user input, such that thesecurity node 30 may “learn” new or changing RF fingerprints duringrepeated received communication with the wireless network 34. Forexample, any overwriting and/or updating of the database in the memory36 of the security node 30 may be logged in the memory 36.

Many other possible embodiments and configurations in addition to thatshown in the above figures are contemplated by the present disclosure.For example, one embodiment of the invention contemplates including aplurality of interconnected communicating security nodes 30 distributedabout the aircraft 10 such that the security node 30 network may be ableto physically locate or physically estimate, for example by RF signalanalysis and/or RF signal triangulation, the source of an authorized orunauthorized communication on the wireless network 34. In this example,the plurality of security nodes 30 may all be located within theboundaries of the wireless network 34.

In another example embodiment of the invention, each access point 22 andnode 26, 30 may be configured with a plurality of antennas that areconfigured to communicate over a plurality of wireless networks 34having distinguishable band ranges, dissimilar operating radiofrequencies, and/or predefined communicating means, individually orsimultaneously. For example, the plurality of wireless networks 34 maybe provided for data redundancy in the aircraft. In this example, thesecurity node 30 may be configured to create individual RF fingerprintsfor each remote node 26 communication on the dissimilar wirelessnetworks 34, which may then be compared against the database forimproved and/or redundant security of the wireless networks 34.Additionally, the method and apparatus may include enabling or disablinga portion of the wireless networks that are being accessed byunauthorized devices, based on the comparison of the security node 30.

The embodiments disclosed herein provide a method and apparatus formanaging security in a wireless network for fixed aircraft components.The technical effect is that the above described embodiments enable thedetermination and/or identification of unauthorized nodes attempting toaccess the wireless network of the aircraft. One advantage that may berealized in the above embodiments is that the above describedembodiments ensure that communications for a given network node areoriginating from an authorized network node, and possible from anexpected physical location. Another advantage may include suitablealerts and/or logging of authorized and/or unauthorized access in orderto protect the security of the wireless network. Furthermore, due to thecreation of the RF fingerprint, and not relying solely on a dataanalysis of the communications, the security node may be capable ofidentifying untrusted or unauthorized devices that may be attempting tomask their identities, or “spoof” their identities as a trusted node. Inthis example, “spoofing” may be limited to masking the identity of theunauthorized device through data transmission characteristics, such asmedia access control (MAC) addressing, and/or internet protocol (IP)addressing, as opposed to signal waveform (i.e. RF fingerprintcharacteristics).

Yet another advantage of the above-described system allows for thecontinual learning of the RF fingerprints over a period of time suchthat variance from RF signal, for example, due to aircraft load, may beupdated as needed, to ensure proper security node operations despitevarying RF signal conditions. Furthermore, by utilizing wirelessnetworks, aircrafts may be able to shed the previous wired networkcommunication lines that had interconnected the components with theaircraft systems. The result of eliminating the need for miles of metalwiring may be significant, and may result in improved efficiency ofaircraft operations and/or fuel savings. The above-described embodimentsprovide for an improved detection system for identifying authorized andunauthorized wireless access in an aircraft. Improved detection improvesthe overall security and integrity of the wireless network.

To the extent not already described, the different features andstructures of the various embodiments may be used in combination witheach other as desired. That one feature may not be illustrated in all ofthe embodiments is not meant to be construed that it may not be, but isdone for brevity of description. Thus, the various features of thedifferent embodiments may be mixed and matched as desired to form newembodiments, whether or not the new embodiments are expressly described.All combinations or permutations of features described herein arecovered by this disclosure.

This written description uses examples to disclose the invention,including the best mode, and also to enable any person skilled in theart to practice the invention, including making and using any devices orsystems and performing any incorporated methods. The patentable scope ofthe invention is defined by the claims, and may include other examplesthat occur to those skilled in the art. Such other examples are intendedto be within the scope of the claims if they have structural elementsthat do not differ from the literal language of the claims, or if theyinclude equivalent structural elements with insubstantial differencesfrom the literal languages of the claims.

What is claimed is:
 1. An aircraft wireless network for fixed aircraftcomponents, comprising: a wireless access point located in the aircraftand defining the boundaries of the wireless network; a wireless remotenode fixedly located within the aircraft and communicating with thewireless network, located within the boundaries of the wireless network,and whose communication defines a radio frequency (RF) fingerprint; andmore than one fixed security nodes located within the boundaries of thewireless network, having a database of authorized RF fingerprints, andreceiving communications of the wireless network; wherein the more thanone fixed security nodes compare the RF fingerprint of the receivedremote node communication with the database, wherein the more than onefixed security nodes a level of access of the wireless remote node tothe wireless network based at least partially on the comparison of theRF fingerprint with the database based on repeated receivedcommunication, and wherein the more than one fixed security nodestriangulate the received communications to determine the location of thewireless remote node within the boundaries of the wireless network. 2.The wireless network of claim 1, wherein each of the wireless accesspoint and wireless remote node comprise multiple antennas, and whereinthe RF fingerprint comprises a signal sending network address.
 3. Thewireless network of claim 2, wherein each antenna of the multipleantennas communicates over a plurality of wireless networks havingdissimilar operating radio frequencies, and each communication definesan RF fingerprint.
 4. The wireless network of claim 2, furthercomprising a human interaction device communicatively coupled with theat least one of the more than one fixed security nodes and providingindicia of the communication based on the comparison, to a user, theindicia of the communication further comprising sending an alert to atleast an aircraft pilot.
 5. The wireless network of claim 2, furthercomprising a second security node located within the boundaries of thewireless network away from the more than one fixed security nodes,communicatively coupled with the at least one of the more than one fixedsecurity nodes, and receiving communications of the wireless network,wherein the at least one of the more than one fixed security nodes andthe second security node collectively compare each respectively receivedRF fingerprint with the database.
 6. The wireless network of claim 3,wherein the more than one fixed security nodes receive communicationsfrom each wireless network of the plurality of wireless networks, andwherein the more than one fixed security nodes further compare the RFfingerprint of at least one wireless remote node communication on eachwireless network of the plurality of wireless networks with thedatabase.
 7. The wireless network of claim 3, further comprising a humaninteraction device communicatively coupled with the at least one of themore than one fixed security nodes and providing indicia of thecommunication based on the comparison, to a user, the indicia of thecommunication further comprising at least one of a sound or a light. 8.The wireless network of claim 6, wherein the RF fingerprint comprises atleast one of signal direction of arrival, signal rise time, or signalfall time.
 9. The wireless network of claim 8 further comprising: atleast one of a computer or a processing element; and at least one of adata storage unit or memory, wherein the database of authorized RFfingerprints further comprises a predetermined database of authorized RFfingerprints, and wherein the at least one of a computer or a processingelement further comprises at least one of a flight management system, aprimary flight display system, an autopilot system or an autolandsystem.
 10. The wireless network of claim 9, further comprising a humaninteraction device communicatively coupled with at least one of the morethan one fixed security nodes and is configured to provide indicia ofthe communication based on the comparison, to a user, wherein the RFfingerprint comprises a signal wave form.
 11. The wireless network ofclaim 1, wherein the database of authorized RF fingerprints furthercomprises a range of authorized RF fingerprints wherein the range takesinto account a predefined variance of the authorized RF fingerprints dueto at least one of aircraft cargo, passengers, varying fuel levels,environmental conditions, altitude, or humidity.
 12. The wirelessnetwork of claim 1, wherein the wireless remote node further comprises adata concentrator communicatively coupled with at least one of a sensor,actuator, or line replaceable unit, such that the data provided to thedata concentrator is communicated to the wireless network, and whereinthe RF fingerprint comprises at least one of signal repeat period orsignal power level.
 13. A method for managing security in a wirelessnetwork having a wireless access point located in the aircraft anddefining the boundaries of the wireless network, a wireless remote nodefixedly located within the aircraft and communicating with the wirelessnetwork, and a fixed security node, the method comprising: receiving, inthe fixed security node, a communication from the wireless remote node;creating an RF fingerprint of the wireless remote node based on thereceived communication; comparing the RF fingerprint with a database ofauthorized remote node RF fingerprints; determining if the wirelessremote node is an authorized wireless remote node based on thecomparison, authorizing, in the fixed security node, a level of accessof the wireless remote node to the wireless network, the authorizingbased at least partially on the comparison of the RF fingerprint withthe database; providing indicia to a user based upon a determinationthat a remote node is unauthorized; receiving, in the fixed securitynode, a user input to update the database to include the unauthorizedwireless remote node RF fingerprint; and learning an RF fingerprintvariance of an authorized wireless remote node based on repeatedreceived communication, wherein authorizing a level of access comprisesat least one of granting full access, granting limited access, grantingtemporary access and denying access, wherein the database comprises acomputer-searchable database of information, the computer-searchabledatabase of information including memory and one or more processors, andwherein receiving, in the fixed security node, comprises receiving atleast one communication in multiple fixed security nodes from thewireless remote node, and triangulating the at least one communicationin the multiple fixed security nodes the location of the wireless remotenode within the boundaries of the wireless network.
 14. The method ofclaim 13, further comprising learning an RF fingerprint variance of anauthorized wireless remote node based on repeated receivedcommunications, the wireless network having a wireless access pointlocated in the aircraft and defining the boundaries of the wirelessnetwork, wherein authorizing a level of access comprises grantingtemporary access to the wireless network.
 15. The method of claim 14,further comprising updating the database of authorized remote node RFfingerprints to include the RF fingerprint variance based on thelearning, the wireless remote node fixedly located within the aircraftand communicating with the wireless network.
 16. The method of claim 13,further comprising: learning an RF fingerprint variance of an authorizedremote node based on repeated received communications, determining thatthe wireless remote node is an unauthorized wireless remote node basedon the comparison, and disabling one or more portions of the networkbeing accessed by the wireless unauthorized remote node.