Strohmeier et al., 2014 - Google Patents
On the security of the automatic dependent surveillance-broadcast protocolStrohmeier et al., 2014
View PDF- Document ID
- 1635504628578110357
- Author
- Strohmeier M
- Lenders V
- Martinovic I
- Publication year
- Publication venue
- IEEE Communications Surveys & Tutorials
External Links
Snippet
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next-generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion …
- 230000001419 dependent 0 title abstract description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
Wu et al. | Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey | |
Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
Manesh et al. | Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions | |
Wesson et al. | Can cryptography secure next generation air traffic surveillance? | |
US9052375B2 (en) | Method for validating aircraft traffic control data | |
Strohmeier et al. | On perception and reality in wireless air traffic communication security | |
Strohmeier | Security in next generation air traffic communication networks | |
Sampigethaya et al. | Future e-enabled aircraft communications and security: The next 20 years and beyond | |
Arshad et al. | Beacon trust management system and fake data detection in vehicular ad‐hoc networks | |
de Melo et al. | UAVouch: a secure identity and location validation scheme for UAV-networks | |
Strohmeier et al. | Crowdsourcing security for wireless air traffic communications | |
Kacem et al. | ADS-Bsec: A holistic framework to secure ADS-B | |
Kim et al. | A secure location verification method for ADS-B | |
Mäurer et al. | Security in digital aeronautical communications a comprehensive gap analysis | |
Mirzaei et al. | Security of ADS-B: Attack scenarios | |
Jansen et al. | Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance. | |
Zhang et al. | A robust and practical solution to ADS-B security against denial-of-service attacks | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Chen | An authenticated encryption scheme for automatic dependent surveillance-broadcast data link | |
Sampigethaya et al. | Visualization & assessment of ADS-B security for green ATM | |
Kacem et al. | Secure ADS-B framework “ADS-Bsec” | |
Wu et al. | ADS-Bchain: A Blockchain-based Trusted Service Scheme for Automatic Dependent Surveillance-Broadcast | |
Ahmed et al. | A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions |