2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC) 2015
DOI: 10.1109/dasc.2015.7311419
|View full text |Cite
|
Sign up to set email alerts
|

Towards a more secure ATC voice communications system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…while others mention problems with pirate radio stations. There are some related incidents with spoofed voice communication reported in the aviation literature and on the Internet [36], and recent works also discuss the urgent need to improve the security of VHF [36], [37]. While intruders are quickly detected through changes in signal or voice levels, between 30% and 40% of VHF users believe it offers technical integrity and authenticity checks.…”
Section: Voice (Vhf)mentioning
confidence: 99%
See 1 more Smart Citation
“…while others mention problems with pirate radio stations. There are some related incidents with spoofed voice communication reported in the aviation literature and on the Internet [36], and recent works also discuss the urgent need to improve the security of VHF [36], [37]. While intruders are quickly detected through changes in signal or voice levels, between 30% and 40% of VHF users believe it offers technical integrity and authenticity checks.…”
Section: Voice (Vhf)mentioning
confidence: 99%
“…Typical representatives of this type of research are separate intrusion detection mechanisms based on cyber-physical defenses such as improved localization protocols (e.g., [57]). Also in this category, we can find works on statistical analysis [58], machine learning [36], physical-layer security [102]- [104], or data fusion with backup technologies [100]. The characteristic shared by these approaches is the fact that they can be deployed within a small time window.…”
Section: Directions In Aviation Security Researchmentioning
confidence: 99%
“…An investigation showed that speech recognition algorithms could be used to automate and scale a tracking strategy, even if blocking measures were utilized to prevent public websites from obtaining the data [38] . Real-world instances of air traffic controller impersonation in Turkish airspace [25] and at Melbourne airport created concern for controllers.…”
Section: Very High Frequency (Vhf)mentioning
confidence: 99%
“…The secure ATC communications (SACom) prototype is a modular system which was developed as one of seven prototypes within the project, which were designed to close known security gaps in present or near future ATM systems [10]. Air-ground voice communication was recently described again to be one of the most endangered communication means for spoofing and/or spamming [11].…”
Section: An Example: the Sacom Prototypementioning
confidence: 99%