Research Article
BibTex RIS Cite
Year 2019, Volume: 3 Issue: 2, 135 - 143, 30.09.2019
https://doi.org/10.30516/bilgesci.405074

Abstract

References

  • [1] J. Hird, M. Hawley and C. Machin, ”Air Traffic Management Security Research in SESAR,” 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, 2016, pp. 486-492.
  • [2] P. Skaves, ”FAA Aircraft Systems Information Security Protection overview,” 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), Herdon, VA, 2015, pp. A1-1-A1-17.
  • [3] M. Rusko and M. Finke, ”Using speech analysis in voice communication: A new approach to improve air traffic management security,” 2016 7th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Wroclaw, 2016, pp. 000181-000186.
  • [4] M. Monteiro, T. Sarmento, A. Barreto, P. Costa and M. Hieb, ”An integrated mission and cyber simulation for Air Traffic Control,” 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, 2016, pp. 2687-2692.
  • [5] Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, Computers and Electrical Engineering, Volume 39, Issue 1, January 2013, Pages 34-46.
  • [6] S. Pradhan et al., ”Establishing Secure Interactions across Distributed Applications in Satellite Clusters,” 2014 IEEE International Conference on Space Mission Challenges for Information Technology, Laurel MD, 2014, pp. 67-74.
  • [7] Angelo Corsaro, ”The DDS Tutorial” http://download.prismtech.com/docs/Vortex/pdfs/OpenSplice_DDSTutorial.pdf
  • [8] CSFI volunteers, ”CSFI ATC (Air Traffic Control) Cyber security Project”,July 16, 2015, https://scadahacker.com/library/Documents/Case_Studies/CSFI%20-%20ATC%20Cyber%20Security%20Project.pdf
  • [9] Jon Gilbert, Scott Boden, Roger Atkinson, ”Aircraft data and voice communications system and method”, February 13, 2003.
  • [10]https://www.ead.eurocontrol.int/eadcms/eadsite/evolutions/aimsl.html
  • [11] https://arstechnica.com/tech-policy/2015/03/us-air-traffic-control-computer-system-vulnerable-to-terrorist-hackers/
  • [12] http://www.gao.gov/assets/670/668169.pdf
  • [13] https://ecfsapi.fcc.gov/file/7021694523.pdf
  • [14] http://securityaffairs.co/wordpress/40975/hacking/easa-airplane-hacking.html
  • [15] http://securityaffairs.co/wordpress/13625/hacking/hijacking-planes-navigation-system-with-android-reality-or-unnecessary-alarm.html
  • [16] http://www.securityweek.com/fbi-says-researcher-admitted-hacking-airplane-mid-flight
  • [17] http://abcnews.go.com/US/story?id=95993&page=1
  • [18] https://mods-n-hacks.gadgethacks.com/how-to/hack-transistor-radio-hear-air-traffic-control-232754/
  • [19]https://www.npr.org/sections/alltechconsidered/2012/08/16/158758161/could-the-new-air-traffic-control-system-be-hacked
  • [20] https://www.airport-technology.com/features/featureair-traffic-control-easy-target-hackers/
  • [21] https://www.theverge.com/2017/11/23/16694118/mr-robot-hack-report-s3e7-fredrick-tanya

Air Traffic Security against Cyber Threats

Year 2019, Volume: 3 Issue: 2, 135 - 143, 30.09.2019
https://doi.org/10.30516/bilgesci.405074

Abstract

Air
Traffic Management (ATM) security is amongst major topics of safety critical
systems and issues of both civil aviation and military defense units. The
dramatic increase in the number of the aircrafts and the innovative technology
that provides smaller and sustainable air vehicles make the air communication
protocols and methods as a high profile potential target for black hat hackers.
There are lots of communication protocols and different systems between air to
ground (A2G) station and air to air (A2A). These include set of information
such as aircraft communication data, voice information and flight planning
which works on some protocols. All of radar detection and chasing systems are
also using similar techniques. The Data Distribution Service (DDS) is a
protocol for data transfer to each node. The communication systems can be
protected from third party system or hackers to some extent. The security is
coming from that point. Each components have own security using valid and
standard methods. Our approach in this study, enforces reasonable and
applicable security concepts and techniques for a robust and resillient air
traffic.

References

  • [1] J. Hird, M. Hawley and C. Machin, ”Air Traffic Management Security Research in SESAR,” 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, 2016, pp. 486-492.
  • [2] P. Skaves, ”FAA Aircraft Systems Information Security Protection overview,” 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), Herdon, VA, 2015, pp. A1-1-A1-17.
  • [3] M. Rusko and M. Finke, ”Using speech analysis in voice communication: A new approach to improve air traffic management security,” 2016 7th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Wroclaw, 2016, pp. 000181-000186.
  • [4] M. Monteiro, T. Sarmento, A. Barreto, P. Costa and M. Hieb, ”An integrated mission and cyber simulation for Air Traffic Control,” 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, 2016, pp. 2687-2692.
  • [5] Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, Computers and Electrical Engineering, Volume 39, Issue 1, January 2013, Pages 34-46.
  • [6] S. Pradhan et al., ”Establishing Secure Interactions across Distributed Applications in Satellite Clusters,” 2014 IEEE International Conference on Space Mission Challenges for Information Technology, Laurel MD, 2014, pp. 67-74.
  • [7] Angelo Corsaro, ”The DDS Tutorial” http://download.prismtech.com/docs/Vortex/pdfs/OpenSplice_DDSTutorial.pdf
  • [8] CSFI volunteers, ”CSFI ATC (Air Traffic Control) Cyber security Project”,July 16, 2015, https://scadahacker.com/library/Documents/Case_Studies/CSFI%20-%20ATC%20Cyber%20Security%20Project.pdf
  • [9] Jon Gilbert, Scott Boden, Roger Atkinson, ”Aircraft data and voice communications system and method”, February 13, 2003.
  • [10]https://www.ead.eurocontrol.int/eadcms/eadsite/evolutions/aimsl.html
  • [11] https://arstechnica.com/tech-policy/2015/03/us-air-traffic-control-computer-system-vulnerable-to-terrorist-hackers/
  • [12] http://www.gao.gov/assets/670/668169.pdf
  • [13] https://ecfsapi.fcc.gov/file/7021694523.pdf
  • [14] http://securityaffairs.co/wordpress/40975/hacking/easa-airplane-hacking.html
  • [15] http://securityaffairs.co/wordpress/13625/hacking/hijacking-planes-navigation-system-with-android-reality-or-unnecessary-alarm.html
  • [16] http://www.securityweek.com/fbi-says-researcher-admitted-hacking-airplane-mid-flight
  • [17] http://abcnews.go.com/US/story?id=95993&page=1
  • [18] https://mods-n-hacks.gadgethacks.com/how-to/hack-transistor-radio-hear-air-traffic-control-232754/
  • [19]https://www.npr.org/sections/alltechconsidered/2012/08/16/158758161/could-the-new-air-traffic-control-system-be-hacked
  • [20] https://www.airport-technology.com/features/featureair-traffic-control-easy-target-hackers/
  • [21] https://www.theverge.com/2017/11/23/16694118/mr-robot-hack-report-s3e7-fredrick-tanya
There are 21 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Research Articles
Authors

Ahmet Efe

Büşra Tuzlupınar This is me

Ahmet Can Cavlan This is me

Publication Date September 30, 2019
Acceptance Date July 23, 2019
Published in Issue Year 2019 Volume: 3 Issue: 2

Cite

APA Efe, A., Tuzlupınar, B., & Can Cavlan, A. (2019). Air Traffic Security against Cyber Threats. Bilge International Journal of Science and Technology Research, 3(2), 135-143. https://doi.org/10.30516/bilgesci.405074