2016
DOI: 10.1109/tits.2016.2612584
|View full text |Cite
|
Sign up to set email alerts
|

On Perception and Reality in Wireless Air Traffic Communication Security

Abstract: More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these contributions have resonated widely within aviation circles. At the same time, the security community lacks certain… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
58
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 69 publications
(74 citation statements)
references
References 61 publications
1
58
0
2
Order By: Relevance
“…There have been many previous efforts exploring both the cybersecurity vulnerabilities within ATC system, along with work exploring the vulnerability of ATC sectors and flows to traditional disruptions (e.g., weather). Key efforts that explored the cybersecurity of air traffic control include work by Strohmeier [24,26] which introduces a survey of the communication devices used in ATC and identifies vulnerabilities for each device. Further work in [4], explores cyber vulnerabilities within the NEXTGEN platform, specifically the ADS-B communications and then explores potential threat impacts based on the aircraft locations and attacker goals.…”
Section: Related Workmentioning
confidence: 99%
“…There have been many previous efforts exploring both the cybersecurity vulnerabilities within ATC system, along with work exploring the vulnerability of ATC sectors and flows to traditional disruptions (e.g., weather). Key efforts that explored the cybersecurity of air traffic control include work by Strohmeier [24,26] which introduces a survey of the communication devices used in ATC and identifies vulnerabilities for each device. Further work in [4], explores cyber vulnerabilities within the NEXTGEN platform, specifically the ADS-B communications and then explores potential threat impacts based on the aircraft locations and attacker goals.…”
Section: Related Workmentioning
confidence: 99%
“…Air-ground voice communication was recently described again to be one of the most endangered communication means for spoofing and/or spamming [11]. In particular, the SACom aims at improving the security of air-ground voice communication between pilots and air traffic control.…”
Section: An Example: the Sacom Prototypementioning
confidence: 99%
“…Anyone can listen in on current ATC voice communication with the help of equipment easy to access. It is also relatively easy to record and decode unencrypted air-ground data transmissions [21], [22], [24]. In voice based ATC no attempt has been made to keep the communications confidential and neither is there any intent to make the existing ATC datalink confidential [7], [31].…”
Section: A Confidentialitymentioning
confidence: 99%
“…Even though the security threat picture in future ATM is severe, some mitigating factors already exist [24]. Safety has always been the primary concern of the aviation community and many of the safety mechanisms that are in place in today's aircraft and ground systems will also reduce the risks of security incidents.…”
Section: Mitigating Factorsmentioning
confidence: 99%