|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 95 |
| Published: April 2026 |
| Authors: Sri Sowmya Nemani |
10.5120/ijcafb2d289ee728
|
Sri Sowmya Nemani . TLS Trust Model Failures in Constrained Networks: A Case Study of In-Flight Connectivity Systems. International Journal of Computer Applications. 187, 95 (April 2026), 31-34. DOI=10.5120/ijcafb2d289ee728
@article{ 10.5120/ijcafb2d289ee728,
author = { Sri Sowmya Nemani },
title = { TLS Trust Model Failures in Constrained Networks: A Case Study of In-Flight Connectivity Systems },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 95 },
pages = { 31-34 },
doi = { 10.5120/ijcafb2d289ee728 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Sri Sowmya Nemani
%T TLS Trust Model Failures in Constrained Networks: A Case Study of In-Flight Connectivity Systems%T
%J International Journal of Computer Applications
%V 187
%N 95
%P 31-34
%R 10.5120/ijcafb2d289ee728
%I Foundation of Computer Science (FCS), NY, USA
This paper examines how modern TLS trust models interact with constrained network environments, specifically in-flight connectivity (IFC) systems. Through systematic observational analysis of certificate handling on a major domestic airline, a critical gap was documented between operating-system-level certificate validation and application-level certificate pinning. The study identifies three co-occurring conditions that produce this failure: OS trust stores accepting any certificate chaining to a trusted root, applications mandating specific pinned certificates, and captive portals presenting valid certificates for the wrong domain. This research contributes to understanding how legitimate captive portal architectures can inadvertently trigger security warnings that confuse users, break application functionality, and desensitize users to genuine security threats, despite using properly configured PKI infrastructure.