Martinovic et al., 2013 - Google Patents
Security of ADS− B: State of the Art and BeyondMartinovic et al., 2013
View PDF- Document ID
- 4414037470406071842
- Author
- Martinovic I
- Strohmeier M
- Publication year
External Links
Snippet
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion …
- 230000001419 dependent 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
| Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
| Wu et al. | Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey | |
| Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
| So et al. | Physical layer plausibility checks for misbehavior detection in V2X networks | |
| Wesson et al. | Can cryptography secure next generation air traffic surveillance? | |
| Strohmeier | Security in next generation air traffic communication networks | |
| Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
| Costin et al. | Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices | |
| US9052375B2 (en) | Method for validating aircraft traffic control data | |
| Kim et al. | ADS-B vulnerabilities and a security solution with a timestamp | |
| Arshad et al. | Beacon trust management system and fake data detection in vehicular ad‐hoc networks | |
| US11022696B1 (en) | ADS-Bsec: a holistic framework to secure ADS-B | |
| Zhang et al. | A robust and practical solution to ADS-B security against denial-of-service attacks | |
| Strohmeier et al. | Crowdsourcing security for wireless air traffic communications | |
| Kacem et al. | ADS-Bsec: A holistic framework to secure ADS-B | |
| Khan et al. | A survey on security of automatic dependent surveillance-broadcast (ADS-B) protocol: Challenges, potential solutions and future directions | |
| Didouh et al. | Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security | |
| Jansen et al. | Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance. | |
| Ahmed et al. | A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions | |
| Wu et al. | ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast | |
| Sampigethaya | Aircraft cyber security risk assessment: Bringing air traffic control and cyber-physical security to the forefront | |
| Cretin et al. | Test data generation for false data injection attack testing in air traffic surveillance | |
| Kacem et al. | Secure ads-b framework “ads-bsec” | |
| Ahmed | Advancements in ADS-B security: a comprehensive survey of vulnerabilities, mitigation strategies, system requirements, and emerging research trends |