Pennapareddy et al., 2024 - Google Patents
A method to mitigate cyber exploits on automatic dependent surveillance-broadcast (ADS-B) data transmissionsPennapareddy et al., 2024
- Document ID
- 5795650599461987519
- Author
- Pennapareddy S
- Srinivasan R
- K N
- Publication year
- Publication venue
- Aircraft Engineering and Aerospace Technology
External Links
Snippet
Purpose Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended …
- 238000000034 method 0 title abstract description 64
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/45—Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Manulis et al. | Cyber security in new space: Analysis of threats, key enabling technologies and challenges | |
| Wu et al. | Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey | |
| Strohmeier et al. | Intrusion detection for airborne communication using PHY-layer information | |
| Kim et al. | ADS-B vulnerabilities and a security solution with a timestamp | |
| Kang et al. | A survey on satellite communication system security | |
| Mahmoud et al. | Aeronautical communication transition from analog to digital data: A network security survey | |
| Smith et al. | Economy class crypto: Exploring weak cipher usage in avionic communications via ACARS | |
| Strohmeier | Security in next generation air traffic communication networks | |
| Yang et al. | LHCSAS: A lightweight and highly-compatible solution for ADS-B security | |
| Sciancalepore et al. | SOS: Standard-compliant and packet loss tolerant security framework for ADS-B communications | |
| Strohmeier et al. | Assessing the impact of aviation security on cyber power | |
| Strohmeier et al. | On the applicability of satellite-based air traffic control communication for security | |
| Kim et al. | A secure location verification method for ADS-B | |
| US20150212206A1 (en) | Automatic dependent surveillance data protection method for air traffic management, and system for the same | |
| Kacem et al. | ADS-Bsec: A holistic framework to secure ADS-B | |
| Finke et al. | ADS-B encryption: confidentiality in the friendly skies | |
| Sampigethaya et al. | Cyber security of unmanned aircraft system traffic management (UTM) | |
| Chen | An authenticated encryption scheme for automatic dependent surveillance-broadcast data link | |
| Ahmed et al. | A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions | |
| Yang et al. | Secure Automatic Dependent Surveillance-Broadcast Systems | |
| Kacem et al. | Secure ads-b framework “ads-bsec” | |
| Dansarie | Security issues in special-purpose digital radio communication systems: a systematic review | |
| Willbold et al. | Satellite cybersecurity reconnaissance: Strategies and their real-world evaluation | |
| Khan et al. | Securing ADS-B Communications through a Novel Authentication Framework | |
| Pennapareddy et al. | A method to mitigate cyber exploits on automatic dependent surveillance-broadcast (ADS-B) data transmissions |