Strohmeier et al., 2016 - Google Patents
Assessing the impact of aviation security on cyber powerStrohmeier et al., 2016
View PDF- Document ID
- 12225249678150221039
- Author
- Strohmeier M
- Schäfer M
- Smith M
- Lenders V
- Martinovic I
- Publication year
- Publication venue
- 2016 8th International Conference on Cyber Conflict (CyCon)
External Links
Snippet
We analyse the impact of new wireless technology threat models on cyber power, using the aviation context as an example. The ongoing move from traditional air traffic control systems such as radar and voice towards enhanced surveillance and communications systems using …
- 238000004891 communication 0 abstract description 26
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S7/00—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
- G01S7/02—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Strohmeier et al. | Assessing the impact of aviation security on cyber power | |
Manesh et al. | Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions | |
Dave et al. | Cyber security challenges in aviation communication, navigation, and surveillance | |
Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
Costin et al. | Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices | |
Schäfer et al. | Experimental analysis of attacks on next generation air traffic communication | |
Strohmeier | Security in next generation air traffic communication networks | |
Strohmeier et al. | Intrusion detection for airborne communication using PHY-layer information | |
Strohmeier et al. | Crowdsourcing security for wireless air traffic communications | |
Cohen et al. | Security analysis of radar systems | |
Strohmeier et al. | Securing the air–ground link in aviation | |
Khandker et al. | Cybersecurity attacks on software logic and error handling within ADS-B implementations: Systematic testing of resilience and countermeasures | |
Akerman et al. | VizADS-B: Analyzing sequences of ADS-B images using explainable convolutional LSTM encoder-decoder to detect cyber attacks | |
Mäurer et al. | Security in digital aeronautical communications a comprehensive gap analysis | |
Stelkens-Kobsch et al. | Towards a more secure ATC voice communications system | |
Mirzaei et al. | Security of ADS-B: Attack scenarios | |
Costin et al. | Towards a unified cybersecurity testing lab for satellite, aerospace, avionics, maritime, drone (SAAMD) technologies and communications | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Srirangam et al. | Safety and security issues in employing drones | |
Hannah et al. | Traffic collision avoidance system: threat actor model and attack taxonomy | |
Wang et al. | On the security of the FLARM collision warning system | |
Harison et al. | Survey of cyber threats in air traffic control and aircraft communications systems | |
Habler et al. | Evaluating the security of aircraft systems | |
Xie et al. | Cybersecurity trends in low-altitude air traffic management | |
Haass et al. | A framework for aviation cybersecurity |