Harison et al., 2018 - Google Patents
Survey of cyber threats in air traffic control and aircraft communications systemsHarison et al., 2018
View PDF- Document ID
- 14883997054556389190
- Author
- Harison E
- Zaidenberg N
- Publication year
- Publication venue
- Cyber Security: Power and Technology
External Links
Snippet
Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and …
- 238000005516 engineering process 0 abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0004—Transmission of traffic-related information to or from an aircraft
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0047—Navigation or guidance aids for a single aircraft
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
Lykou et al. | Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies | |
Dave et al. | Cyber security challenges in aviation communication, navigation, and surveillance | |
Schäfer et al. | Experimental analysis of attacks on next generation air traffic communication | |
Costin et al. | Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices | |
McCallie et al. | Security analysis of the ADS-B implementation in the next generation air transportation system | |
Strohmeier | Security in next generation air traffic communication networks | |
Strohmeier et al. | Assessing the impact of aviation security on cyber power | |
Elmarady et al. | Studying cybersecurity in civil aviation, including developing and applying aviation cybersecurity risk assessment | |
Ajakwe et al. | Drone transportation system: Systematic review of security dynamics for smart mobility | |
Strohmeier et al. | Securing the air–ground link in aviation | |
Wolf et al. | Information technology security threats to modern e-enabled aircraft: A cautionary note | |
Habler et al. | Assessing aircraft security: A comprehensive survey and methodology for evaluation | |
Smith et al. | Understanding realistic attacks on airborne collision avoidance systems | |
Sampigethaya et al. | Cyber security of unmanned aircraft system traffic management (UTM) | |
Mirzaei et al. | Security of ADS-B: Attack scenarios | |
Viveros | Analysis of the cyber attacks against ADS-B perspective of aviation experts | |
Haass et al. | Aviation and cybersecurity: opportunities for applied research | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Harison et al. | Survey of cyber threats in air traffic control and aircraft communications systems | |
Sampigethaya et al. | Visualization & assessment of ADS-B security for green ATM | |
Wang et al. | On the security of the FLARM collision warning system | |
Ishtiaq et al. | Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry | |
Haass et al. | A framework for aviation cybersecurity |