[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Strohmeier et al., 2013 - Google Patents

Security of ADS− B: State of the Art and Beyond

Strohmeier et al., 2013

View PDF
Document ID
2253183099888057133
Author
Strohmeier M
Lenders V
Martinovic I
Publication year

External Links

Snippet

Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion …
Continue reading at ora.ox.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/76Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Strohmeier et al. On the security of the automatic dependent surveillance-broadcast protocol
Strohmeier et al. Security of ADS− B: State of the Art and Beyond
Manesh et al. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
Wu et al. Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey
Manesh et al. Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions
So et al. Physical layer plausibility checks for misbehavior detection in V2X networks
Wesson et al. Can cryptography secure next generation air traffic surveillance?
Costin et al. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
US9052375B2 (en) Method for validating aircraft traffic control data
Strohmeier Security in next generation air traffic communication networks
Arshad et al. Beacon trust management system and fake data detection in vehicular ad‐hoc networks
Strohmeier et al. Crowdsourcing security for wireless air traffic communications
Hamdi et al. A review on various security attacks in vehicular ad hoc networks
Sciancalepore et al. SOS: Standard-compliant and packet loss tolerant security framework for ADS-B communications
Kacem et al. ADS-Bsec: A holistic framework to secure ADS-B
Li et al. Sequential collaborative detection strategy on ADS-B data attack
Kim et al. A secure location verification method for ADS-B
Mirzaei et al. Security of ADS-B: Attack scenarios
Shang et al. Multidevice False Data Injection Attack Models of ADS‐B Multilateration Systems
Didouh et al. Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security
Hamdi et al. Effect Sybil attack on security Authentication Service in VANET
Mejri et al. Recent advances in cryptographic solutions for vehicular networks
Zhang et al. A robust and practical solution to ADS-B security against denial-of-service attacks
Grover et al. Multivariate verification for Sybil attack detection in VANET
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront