Sampigethaya, 2019 - Google Patents

Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront

Sampigethaya, 2019

Document ID
16956675669710288587
Author
Sampigethaya K
Publication year
Publication venue
AIAA Scitech 2019 Forum

External Links

Snippet

Aircraft cyber security considerations do not include threats emanating from interactions with air traffic systems and those of cyber-physical nature. Next-generation air traffic systems escalate this security problem by adding new functions, such as making avionics rely on …
Continue reading at arc.aiaa.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft, e.g. air-traffic control [ATC]
    • G08G5/0047Navigation or guidance aids for a single aircraft
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft, e.g. air-traffic control [ATC]
    • G08G5/003Flight plan management
    • G08G5/0039Modification of a flight plan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Sampigethaya et al. Future e-enabled aircraft communications and security: The next 20 years and beyond
Manesh et al. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
Strohmeier et al. On perception and reality in wireless air traffic communication security
Yağdereli et al. A study on cyber-security of autonomous and unmanned vehicles
Costin et al. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
Sampigethaya et al. Aviation cyber–physical systems: Foundations for future aircraft and air transport
Strohmeier Security in next generation air traffic communication networks
Sampigethaya et al. Cyber security of unmanned aircraft system traffic management (UTM)
Wolf et al. Information technology security threats to modern e-enabled aircraft: A cautionary note
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront
Strohmeier et al. Securing the air–ground link in aviation
Smith et al. Understanding realistic attacks on airborne collision avoidance systems
Mirzaei et al. Security of ADS-B: Attack scenarios
Bogoda et al. A systems engineering approach to appraise cybersecurity risks of CNS/ATM and avionics systems
Haass et al. Aviation and cybersecurity: opportunities for applied research
Sampigethaya et al. Visualization & assessment of ADS-B security for green ATM
Barreto et al. Developing a complex simulation environment for evaluating cyber attacks
Harison et al. Survey of cyber threats in air traffic control and aircraft communications systems
Asgari et al. Provisioning for a distributed ATM security management: The GAMMA approach
Ishtiaq et al. Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry
Wang et al. On the security of the FLARM collision warning system
Haass et al. A framework for aviation cybersecurity
Limnaios Cybersecurity Considerations for Aerial Networks
Atanasov et al. Security vulnerabilities in next generation air transportation system
Baron Garcia Machine Learning and Artificial Intelligence Methods for Cybersecurity Data within the Aviation Ecosystem