[go: up one dir, main page]

Strohmeier, 2016 - Google Patents

Security in next generation air traffic communication networks

Strohmeier, 2016

View PDF
Document ID
10280633221775904419
Author
Strohmeier M
Publication year

External Links

Snippet

A multitude of wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design and the evolution of wireless security in aviation did not keep …
Continue reading at ora.ox.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/76Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Strohmeier Security in next generation air traffic communication networks
Strohmeier et al. On perception and reality in wireless air traffic communication security
Manesh et al. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
Strohmeier et al. On the security of the automatic dependent surveillance-broadcast protocol
Costin et al. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
Strohmeier et al. Security of ADS− B: State of the Art and Beyond
Schäfer et al. Experimental analysis of attacks on next generation air traffic communication
Elmarady et al. Studying cybersecurity in civil aviation, including developing and applying aviation cybersecurity risk assessment
Strohmeier et al. Assessing the impact of aviation security on cyber power
Strohmeier et al. Opensky: A swiss army knife for air traffic security research
Akerman et al. VizADS-B: Analyzing sequences of ADS-B images using explainable convolutional LSTM encoder-decoder to detect cyber attacks
Strohmeier et al. Crowdsourcing security for wireless air traffic communications
Strohmeier et al. Securing the air–ground link in aviation
Kacem et al. ADS-Bsec: A holistic framework to secure ADS-B
Jansen et al. Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Stelkens-Kobsch et al. Towards a more secure ATC voice communications system
Sampigethaya Aircraft cyber security risk assessment: Bringing air traffic control and cyber-physical security to the forefront
Khan et al. A survey on security of automatic dependent surveillance-broadcast (ADS-B) protocol: Challenges, potential solutions and future directions
Ahmed et al. A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions
Harison et al. Survey of cyber threats in air traffic control and aircraft communications systems
Dansarie Security issues in special-purpose digital radio communication systems: a systematic review
Wang et al. On the security of the FLARM collision warning system
Hannah et al. Traffic collision avoidance system: threat actor model and attack taxonomy
Sampigethaya et al. Visualization & assessment of ADS-B security for green ATM
Xie et al. Cybersecurity trends in low-altitude air traffic management