Strohmeier, 2016 - Google Patents
Security in next generation air traffic communication networksStrohmeier, 2016
View PDF- Document ID
- 10280633221775904419
- Author
- Strohmeier M
- Publication year
External Links
Snippet
A multitude of wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design and the evolution of wireless security in aviation did not keep …
- 238000004891 communication 0 title abstract description 161
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Strohmeier | Security in next generation air traffic communication networks | |
Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
Costin et al. | Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices | |
Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
Schäfer et al. | Experimental analysis of attacks on next generation air traffic communication | |
Elmarady et al. | Studying cybersecurity in civil aviation, including developing and applying aviation cybersecurity risk assessment | |
Strohmeier et al. | Assessing the impact of aviation security on cyber power | |
Strohmeier et al. | Opensky: A swiss army knife for air traffic security research | |
Akerman et al. | VizADS-B: Analyzing sequences of ADS-B images using explainable convolutional LSTM encoder-decoder to detect cyber attacks | |
Strohmeier et al. | Crowdsourcing security for wireless air traffic communications | |
Strohmeier et al. | Securing the air–ground link in aviation | |
Kacem et al. | ADS-Bsec: A holistic framework to secure ADS-B | |
Jansen et al. | Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance. | |
Stelkens-Kobsch et al. | Towards a more secure ATC voice communications system | |
Sampigethaya | Aircraft cyber security risk assessment: Bringing air traffic control and cyber-physical security to the forefront | |
Khan et al. | A survey on security of automatic dependent surveillance-broadcast (ADS-B) protocol: Challenges, potential solutions and future directions | |
Ahmed et al. | A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions | |
Harison et al. | Survey of cyber threats in air traffic control and aircraft communications systems | |
Dansarie | Security issues in special-purpose digital radio communication systems: a systematic review | |
Wang et al. | On the security of the FLARM collision warning system | |
Hannah et al. | Traffic collision avoidance system: threat actor model and attack taxonomy | |
Sampigethaya et al. | Visualization & assessment of ADS-B security for green ATM | |
Xie et al. | Cybersecurity trends in low-altitude air traffic management |