Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao https://doi.org/10.2...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.23919/softc...
Article . 2019 . Peer-reviewed
License: STM Policy #29
Data sources: Crossref
DBLP
Conference object . 2021
Data sources: DBLP
versions View all 2 versions
addClaim

Cyber Security and Information Exchange Analysis of Automatic Dependent Surveillance Broadcast

Authors: Philipp Ortner; Holger Flühr; Erich Leitgeb;

Cyber Security and Information Exchange Analysis of Automatic Dependent Surveillance Broadcast

Abstract

The European Air Traffic Management (ATM) system is moving to a net centric operational environment. This transformation increasingly depends on appropriate communication, navigation and surveillance technologies (CNS) to enhance safety, efficiency, and capacity. New aeronautical data link communications systems such as Automatic Dependent Surveillance Broadcast (ADS-B) allows safer operations, denser airspace and cost savings for operators. However, it is a fact that ADS-B provides unauthenticated information over an unencrypted data link. In this paper, the Mode S data link structure and broadcasts are elaborated as basis to provide a comprehensive understanding for the information exchange and cyber security analysis of ADS-B. The information exchange is demonstrated by analyzing interrogated Mode S broadcasts, followed by a cyber security analysis in terms of a threat picture and taxonomy for various possible attacks. Finally, a scenario-based dynamic threat analysis is illustrated to clarify the consequences of ADS-B vulnerabilities.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    4
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
4
Top 10%
Top 10%
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!