[go: up one dir, main page]

Pennapareddy et al., 2024 - Google Patents

A method to mitigate cyber exploits on automatic dependent surveillance-broadcast (ADS-B) data transmissions

Pennapareddy et al., 2024

Document ID
5795650599461987519
Author
Pennapareddy S
Srinivasan R
K N
Publication year
Publication venue
Aircraft Engineering and Aerospace Technology

External Links

Snippet

Purpose Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended …
Continue reading at www.emerald.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/45Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"

Similar Documents

Publication Publication Date Title
Manulis et al. Cyber security in new space: Analysis of threats, key enabling technologies and challenges
Wu et al. Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey
Strohmeier et al. Intrusion detection for airborne communication using PHY-layer information
Kim et al. ADS-B vulnerabilities and a security solution with a timestamp
Kang et al. A survey on satellite communication system security
Mahmoud et al. Aeronautical communication transition from analog to digital data: A network security survey
Smith et al. Economy class crypto: Exploring weak cipher usage in avionic communications via ACARS
Strohmeier Security in next generation air traffic communication networks
Yang et al. LHCSAS: A lightweight and highly-compatible solution for ADS-B security
Sciancalepore et al. SOS: Standard-compliant and packet loss tolerant security framework for ADS-B communications
Strohmeier et al. Assessing the impact of aviation security on cyber power
Strohmeier et al. On the applicability of satellite-based air traffic control communication for security
Kim et al. A secure location verification method for ADS-B
US20150212206A1 (en) Automatic dependent surveillance data protection method for air traffic management, and system for the same
Kacem et al. ADS-Bsec: A holistic framework to secure ADS-B
Finke et al. ADS-B encryption: confidentiality in the friendly skies
Sampigethaya et al. Cyber security of unmanned aircraft system traffic management (UTM)
Chen An authenticated encryption scheme for automatic dependent surveillance-broadcast data link
Ahmed et al. A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions
Yang et al. Secure Automatic Dependent Surveillance-Broadcast Systems
Kacem et al. Secure ads-b framework “ads-bsec”
Dansarie Security issues in special-purpose digital radio communication systems: a systematic review
Willbold et al. Satellite cybersecurity reconnaissance: Strategies and their real-world evaluation
Khan et al. Securing ADS-B Communications through a Novel Authentication Framework
Pennapareddy et al. A method to mitigate cyber exploits on automatic dependent surveillance-broadcast (ADS-B) data transmissions