Sampigethaya, 2019 - Google Patents
Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefrontSampigethaya, 2019
- Document ID
- 16956675669710288587
- Author
- Sampigethaya K
- Publication year
- Publication venue
- AIAA Scitech 2019 Forum
External Links
Snippet
Aircraft cyber security considerations do not include threats emanating from interactions with air traffic systems and those of cyber-physical nature. Next-generation air traffic systems escalate this security problem by adding new functions, such as making avionics rely on …
- 230000010006 flight 0 abstract description 79
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0047—Navigation or guidance aids for a single aircraft
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/003—Flight plan management
- G08G5/0039—Modification of a flight plan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sampigethaya et al. | Future e-enabled aircraft communications and security: The next 20 years and beyond | |
Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
Yağdereli et al. | A study on cyber-security of autonomous and unmanned vehicles | |
Costin et al. | Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices | |
Sampigethaya et al. | Aviation cyber–physical systems: Foundations for future aircraft and air transport | |
Strohmeier | Security in next generation air traffic communication networks | |
Sampigethaya et al. | Cyber security of unmanned aircraft system traffic management (UTM) | |
Wolf et al. | Information technology security threats to modern e-enabled aircraft: A cautionary note | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Strohmeier et al. | Securing the air–ground link in aviation | |
Smith et al. | Understanding realistic attacks on airborne collision avoidance systems | |
Mirzaei et al. | Security of ADS-B: Attack scenarios | |
Bogoda et al. | A systems engineering approach to appraise cybersecurity risks of CNS/ATM and avionics systems | |
Haass et al. | Aviation and cybersecurity: opportunities for applied research | |
Sampigethaya et al. | Visualization & assessment of ADS-B security for green ATM | |
Barreto et al. | Developing a complex simulation environment for evaluating cyber attacks | |
Harison et al. | Survey of cyber threats in air traffic control and aircraft communications systems | |
Asgari et al. | Provisioning for a distributed ATM security management: The GAMMA approach | |
Ishtiaq et al. | Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry | |
Wang et al. | On the security of the FLARM collision warning system | |
Haass et al. | A framework for aviation cybersecurity | |
Limnaios | Cybersecurity Considerations for Aerial Networks | |
Atanasov et al. | Security vulnerabilities in next generation air transportation system | |
Baron Garcia | Machine Learning and Artificial Intelligence Methods for Cybersecurity Data within the Aviation Ecosystem |