On perception and reality in wireless air traffic communication securityReport as inadecuate

On perception and reality in wireless air traffic communication security - Download this document for free, or read online. Document in PDF available to download.

Reference: Strohmeier, M, Schäfer, M, Pinheiro, R et al., (2016). On perception and reality in wireless air traffic communication security. IEEE Transactions on Intelligent Transportation Systems, 18 (6), 1338-1357.Citable link to this page:


On perception and reality in wireless air traffic communication security

Abstract: More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure, as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these contributions have resonated widely within aviation circles. At the same time, the security community lacks certain aviation domain knowledge, preventing aviation authorities from giving credence to their findings. In this survey, we aim to reconcile the view of the security community and the perspective of aviation professionals concerning the safety of air traffic communication technologies. To achieve this, we first provide a systematization of the applications of wireless technologies upon which civil aviation relies. Based on these applications, we comprehensively analyze vulnerabilities and existing attacks. We further survey the existing research on countermeasures and categorize it into approaches that are applicable in the short term and research of secure new technologies deployable in the long term. Since not all of the required aviation knowledge is codified in academic publications, we additionally examine the existing aviation standards and survey 242 international aviation experts. Besides their domain knowledge, we also analyze the awareness of members of the aviation community concerning the security of wireless systems and collect their expert opinions on the potential impact of concrete attack scenarios using these technologies.

Publication status:PublishedPeer Review status:Peer reviewedVersion:Accepted ManuscriptDate of acceptance:18 September 2016Notes:Copyright © 2016 IEEE. This is the accepted manuscript version of the article. The final version is available online from IEEE at: http://dx.doi.org/10.1109/TITS.2016.2612584

Bibliographic Details

Publisher: IEEE

Publisher Website: http://www.ieee.org/

Journal: IEEE Transactions on Intelligent Transportation Systemssee more from them

Publication Website: http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6979

Volume: 18

Issue: 6

Extent: 1338-1357

Issue Date: 12 October 2016


Doi: https://doi.org/10.1109/TITS.2016.2612584

Issn: 1524-9050

Uuid: uuid:2775d796-e56a-4b95-a65c-a2e6bb861767

Urn: uri:2775d796-e56a-4b95-a65c-a2e6bb861767

Pubs-id: pubs:652069 Item Description

Type: journal-article;

Version: Accepted ManuscriptKeywords: air traffic control air traffic communication air traffic security avionics security


Author: Strohmeier, M - Oxford, MPLS, Computer Science - - - Schäfer, M - - - Pinheiro, R - - - Lenders, V - - - Martinovic, I - Oxford,

Source: https://ora.ox.ac.uk/objects/uuid:2775d796-e56a-4b95-a65c-a2e6bb861767


Related documents