Manesh et al., 2017 - Google Patents
Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) systemManesh et al., 2017
View PDF- Document ID
- 10737843428714338486
- Author
- Manesh M
- Kaabouch N
- Publication year
- Publication venue
- International journal of critical infrastructure protection
External Links
Snippet
Abstract The US Federal Aviation Administration has mandated the use of the Automatic Dependent Surveillance-Broadcast (ADS-B) system by January 2020 as a key component of the NextGen Project, which is intended to upgrade the air traffic control infrastructure and …
- 238000004458 analytical method 0 title abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
Wu et al. | Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey | |
Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
Manesh et al. | Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions | |
Al-Turjman et al. | Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview | |
Wesson et al. | Can cryptography secure next generation air traffic surveillance? | |
Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
Costin et al. | Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices | |
Sampigethaya et al. | Future e-enabled aircraft communications and security: The next 20 years and beyond | |
Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
Schäfer et al. | Experimental analysis of attacks on next generation air traffic communication | |
Strohmeier | Security in next generation air traffic communication networks | |
US9052375B2 (en) | Method for validating aircraft traffic control data | |
Elmarady et al. | Studying cybersecurity in civil aviation, including developing and applying aviation cybersecurity risk assessment | |
Subramani et al. | Efficient anonymous authentication scheme for automatic dependent surveillance‐broadcast system with batch verification | |
Strohmeier et al. | Securing the air–ground link in aviation | |
Kacem et al. | ADS-Bsec: A holistic framework to secure ADS-B | |
Kim et al. | A secure location verification method for ADS-B | |
Mäurer et al. | Security in digital aeronautical communications a comprehensive gap analysis | |
Mirzaei et al. | Security of ADS-B: Attack scenarios | |
Shang et al. | Multidevice False Data Injection Attack Models of ADS‐B Multilateration Systems | |
Sampigethaya et al. | Security and privacy of future aircraft wireless communications with offboard systems | |
Sampigethaya et al. | Visualization & assessment of ADS-B security for green ATM | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Chen | An authenticated encryption scheme for automatic dependent surveillance-broadcast data link |