On Perception and Reality in Wireless Air Traffic Communication Security

@article{Strohmeier2017OnPA,
  title={On Perception and Reality in Wireless Air Traffic Communication Security},
  author={Martin Strohmeier and Matthias Sch{\"a}fer and Rui Pinheiro and Vincent Lenders and Ivan Martinovic},
  journal={IEEE Transactions on Intelligent Transportation Systems},
  year={2017},
  volume={18},
  pages={1338-1357}
}
More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure, as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these contributions have resonated widely within aviation circles. At the same time, the security… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 30 CITATIONS

Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution

  • The Journal of Supercomputing
  • 2018
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Crowdsourcing security for wireless air traffic communications

  • 2017 9th International Conference on Cyber Conflict (CyCon)
  • 2017
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks

  • IEEE Transactions on Aerospace and Electronic Systems
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 85 REFERENCES

On the requirements for successful GPS spoofing attacks

  • ACM Conference on Computer and Communications Security
  • 2011
VIEW 21 EXCERPTS
HIGHLY INFLUENTIAL

Experimental Analysis of Attacks on Wireless Multilateration Systems

D. Moser
  • Master’s thesis, University of Bern, Switzerland, 2015.
  • 2015
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

  • IEEE Communications Surveys & Tutorials
  • 2015
VIEW 13 EXCERPTS
HIGHLY INFLUENTIAL

Aircraft hacking: Practical aero series

H. Teso
  • HITB Security Conference, Apr. 2013.
  • 2013
VIEW 15 EXCERPTS
HIGHLY INFLUENTIAL

Ghost is in the Air(Traffic)

VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Avionics navigation systems

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…