Strohmeier et al., 2016 - Google Patents

Assessing the impact of aviation security on cyber power

Strohmeier et al., 2016

View PDF
Document ID
12225249678150221039
Author
Strohmeier M
Schäfer M
Smith M
Lenders V
Martinovic I
Publication year
Publication venue
2016 8th International Conference on Cyber Conflict (CyCon)

External Links

Snippet

We analyse the impact of new wireless technology threat models on cyber power, using the aviation context as an example. The ongoing move from traditional air traffic control systems such as radar and voice towards enhanced surveillance and communications systems using …
Continue reading at ora.ox.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/76Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00

Similar Documents

Publication Publication Date Title
Strohmeier et al. Assessing the impact of aviation security on cyber power
Manesh et al. Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions
Dave et al. Cyber security challenges in aviation communication, navigation, and surveillance
Strohmeier et al. On perception and reality in wireless air traffic communication security
Costin et al. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
Schäfer et al. Experimental analysis of attacks on next generation air traffic communication
Strohmeier Security in next generation air traffic communication networks
Strohmeier et al. Intrusion detection for airborne communication using PHY-layer information
Strohmeier et al. Crowdsourcing security for wireless air traffic communications
Cohen et al. Security analysis of radar systems
Strohmeier et al. Securing the air–ground link in aviation
Khandker et al. Cybersecurity attacks on software logic and error handling within ADS-B implementations: Systematic testing of resilience and countermeasures
Akerman et al. VizADS-B: Analyzing sequences of ADS-B images using explainable convolutional LSTM encoder-decoder to detect cyber attacks
Mäurer et al. Security in digital aeronautical communications a comprehensive gap analysis
Stelkens-Kobsch et al. Towards a more secure ATC voice communications system
Mirzaei et al. Security of ADS-B: Attack scenarios
Costin et al. Towards a unified cybersecurity testing lab for satellite, aerospace, avionics, maritime, drone (SAAMD) technologies and communications
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront
Srirangam et al. Safety and security issues in employing drones
Hannah et al. Traffic collision avoidance system: threat actor model and attack taxonomy
Wang et al. On the security of the FLARM collision warning system
Harison et al. Survey of cyber threats in air traffic control and aircraft communications systems
Habler et al. Evaluating the security of aircraft systems
Xie et al. Cybersecurity trends in low-altitude air traffic management
Haass et al. A framework for aviation cybersecurity