Manesh et al., 2017 - Google Patents

Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system

Manesh et al., 2017

View PDF
Document ID
10737843428714338486
Author
Manesh M
Kaabouch N
Publication year
Publication venue
International journal of critical infrastructure protection

External Links

Snippet

Abstract The US Federal Aviation Administration has mandated the use of the Automatic Dependent Surveillance-Broadcast (ADS-B) system by January 2020 as a key component of the NextGen Project, which is intended to upgrade the air traffic control infrastructure and …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/76Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS

Similar Documents

Publication Publication Date Title
Manesh et al. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
Wu et al. Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey
Strohmeier et al. On the security of the automatic dependent surveillance-broadcast protocol
Manesh et al. Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions
Al-Turjman et al. Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview
Wesson et al. Can cryptography secure next generation air traffic surveillance?
Strohmeier et al. On perception and reality in wireless air traffic communication security
Costin et al. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
Sampigethaya et al. Future e-enabled aircraft communications and security: The next 20 years and beyond
Strohmeier et al. Security of ADS− B: State of the Art and Beyond
Schäfer et al. Experimental analysis of attacks on next generation air traffic communication
Strohmeier Security in next generation air traffic communication networks
US9052375B2 (en) Method for validating aircraft traffic control data
Elmarady et al. Studying cybersecurity in civil aviation, including developing and applying aviation cybersecurity risk assessment
Subramani et al. Efficient anonymous authentication scheme for automatic dependent surveillance‐broadcast system with batch verification
Strohmeier et al. Securing the air–ground link in aviation
Kacem et al. ADS-Bsec: A holistic framework to secure ADS-B
Kim et al. A secure location verification method for ADS-B
Mäurer et al. Security in digital aeronautical communications a comprehensive gap analysis
Mirzaei et al. Security of ADS-B: Attack scenarios
Shang et al. Multidevice False Data Injection Attack Models of ADS‐B Multilateration Systems
Sampigethaya et al. Security and privacy of future aircraft wireless communications with offboard systems
Sampigethaya et al. Visualization & assessment of ADS-B security for green ATM
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront
Chen An authenticated encryption scheme for automatic dependent surveillance-broadcast data link