[go: up one dir, main page]

Martinovic et al., 2013 - Google Patents

Security of ADS− B: State of the Art and Beyond

Martinovic et al., 2013

View PDF
Document ID
4414037470406071842
Author
Martinovic I
Strohmeier M
Publication year

External Links

Snippet

Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion …
Continue reading at www.cs.ox.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/76Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves

Similar Documents

Publication Publication Date Title
Strohmeier et al. On the security of the automatic dependent surveillance-broadcast protocol
Strohmeier et al. Security of ADS− B: State of the Art and Beyond
Wu et al. Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey
Manesh et al. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
So et al. Physical layer plausibility checks for misbehavior detection in V2X networks
Wesson et al. Can cryptography secure next generation air traffic surveillance?
Strohmeier Security in next generation air traffic communication networks
Strohmeier et al. On perception and reality in wireless air traffic communication security
Costin et al. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
US9052375B2 (en) Method for validating aircraft traffic control data
Kim et al. ADS-B vulnerabilities and a security solution with a timestamp
Arshad et al. Beacon trust management system and fake data detection in vehicular ad‐hoc networks
US11022696B1 (en) ADS-Bsec: a holistic framework to secure ADS-B
Zhang et al. A robust and practical solution to ADS-B security against denial-of-service attacks
Strohmeier et al. Crowdsourcing security for wireless air traffic communications
Kacem et al. ADS-Bsec: A holistic framework to secure ADS-B
Khan et al. A survey on security of automatic dependent surveillance-broadcast (ADS-B) protocol: Challenges, potential solutions and future directions
Didouh et al. Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security
Jansen et al. Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Ahmed et al. A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions
Wu et al. ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast
Sampigethaya Aircraft cyber security risk assessment: Bringing air traffic control and cyber-physical security to the forefront
Cretin et al. Test data generation for false data injection attack testing in air traffic surveillance
Kacem et al. Secure ads-b framework “ads-bsec”
Ahmed Advancements in ADS-B security: a comprehensive survey of vulnerabilities, mitigation strategies, system requirements, and emerging research trends