Strohmeier et al., 2013 - Google Patents
Security of ADS− B: State of the Art and BeyondStrohmeier et al., 2013
View PDF- Document ID
- 2253183099888057133
- Author
- Strohmeier M
- Lenders V
- Martinovic I
- Publication year
External Links
Snippet
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion …
- 230000001419 dependent 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
Wu et al. | Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey | |
Manesh et al. | Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions | |
So et al. | Physical layer plausibility checks for misbehavior detection in V2X networks | |
Wesson et al. | Can cryptography secure next generation air traffic surveillance? | |
Costin et al. | Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices | |
US9052375B2 (en) | Method for validating aircraft traffic control data | |
Strohmeier | Security in next generation air traffic communication networks | |
Arshad et al. | Beacon trust management system and fake data detection in vehicular ad‐hoc networks | |
Strohmeier et al. | Crowdsourcing security for wireless air traffic communications | |
Hamdi et al. | A review on various security attacks in vehicular ad hoc networks | |
Sciancalepore et al. | SOS: Standard-compliant and packet loss tolerant security framework for ADS-B communications | |
Kacem et al. | ADS-Bsec: A holistic framework to secure ADS-B | |
Li et al. | Sequential collaborative detection strategy on ADS-B data attack | |
Kim et al. | A secure location verification method for ADS-B | |
Mirzaei et al. | Security of ADS-B: Attack scenarios | |
Shang et al. | Multidevice False Data Injection Attack Models of ADS‐B Multilateration Systems | |
Didouh et al. | Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security | |
Hamdi et al. | Effect Sybil attack on security Authentication Service in VANET | |
Mejri et al. | Recent advances in cryptographic solutions for vehicular networks | |
Zhang et al. | A robust and practical solution to ADS-B security against denial-of-service attacks | |
Grover et al. | Multivariate verification for Sybil attack detection in VANET | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront |