AIAA 5th ATIO And16th Lighter-Than-Air Sys Tech. And Balloon Systems Conferences 2005
DOI: 10.2514/6.2005-7351
|View full text |Cite
|
Sign up to set email alerts
|

Independent ADS-B Verification and Validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…Different methods for ADS-B protection and security assessment have been proposed [14]- [15]. In [9] a survey of risk mitigation methods is reported.…”
Section: Mitigation and Possible Solutionsmentioning
confidence: 99%
“…Different methods for ADS-B protection and security assessment have been proposed [14]- [15]. In [9] a survey of risk mitigation methods is reported.…”
Section: Mitigation and Possible Solutionsmentioning
confidence: 99%
“…Another solution for terminal areas is the use of secondary surveillance radar for verifying position information received from aircraft. 31 For remote regions where aircraft are engaged in Free Flight, a promising approach for position verification of aircraft is to use ADS-B enabled multilateration in combination with Kalman filter estimation of the flight trajectory based on the bearing information of the source making the position claim. 31 This approach however assumes the availability of a dedicated omni-directional antenna onboard for the heading information.…”
Section: Use Of Multilateration Solutionsmentioning
confidence: 99%
“…An abundance of literature, during the last decade, addresses the airborne ad hoc networking issues such as the design of transmission protocols and the impact of air traffic on the network topology (http://www.airborneinternet.org, [24], [25]), as well as the design of safety-critical airborne traffic operations such as conflict detection and resolution in Free Flight [23]. However, only a few have addressed security vulnerabilities in surveillance applications of airborne ad hoc networks [50], [51].…”
Section: A E-enabled Atc Modelmentioning
confidence: 99%
“…For example, by using a compromised general aviation aircraft equipped with ADS-B or Universal Access Transceiver or by using unattended ground ADS-B equipment [50], [51].…”
Section: B Addressing Vulnerabilities Of Atc 1) Providing Accuracy Imentioning
confidence: 99%