[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Strohmeier et al., 2014 - Google Patents

On the security of the automatic dependent surveillance-broadcast protocol

Strohmeier et al., 2014

View PDF
Document ID
1635504628578110357
Author
Strohmeier M
Lenders V
Martinovic I
Publication year
Publication venue
IEEE Communications Surveys & Tutorials

External Links

Snippet

Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next-generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Strohmeier et al. On the security of the automatic dependent surveillance-broadcast protocol
Manesh et al. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
Wu et al. Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey
Strohmeier et al. Security of ADS− B: State of the Art and Beyond
Manesh et al. Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions
Wesson et al. Can cryptography secure next generation air traffic surveillance?
US9052375B2 (en) Method for validating aircraft traffic control data
Strohmeier et al. On perception and reality in wireless air traffic communication security
Strohmeier Security in next generation air traffic communication networks
Sampigethaya et al. Future e-enabled aircraft communications and security: The next 20 years and beyond
Arshad et al. Beacon trust management system and fake data detection in vehicular ad‐hoc networks
de Melo et al. UAVouch: a secure identity and location validation scheme for UAV-networks
Strohmeier et al. Crowdsourcing security for wireless air traffic communications
Kacem et al. ADS-Bsec: A holistic framework to secure ADS-B
Kim et al. A secure location verification method for ADS-B
Mäurer et al. Security in digital aeronautical communications a comprehensive gap analysis
Mirzaei et al. Security of ADS-B: Attack scenarios
Jansen et al. Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Zhang et al. A robust and practical solution to ADS-B security against denial-of-service attacks
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront
Chen An authenticated encryption scheme for automatic dependent surveillance-broadcast data link
Sampigethaya et al. Visualization & assessment of ADS-B security for green ATM
Kacem et al. Secure ADS-B framework “ADS-Bsec”
Wu et al. ADS-Bchain: A Blockchain-based Trusted Service Scheme for Automatic Dependent Surveillance-Broadcast
Ahmed et al. A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions