2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC) 2016
DOI: 10.1109/dasc.2016.7777967
|View full text |Cite
|
Sign up to set email alerts
|

An efficient, secure and trusted channel protocol for avionics wireless networks

Abstract: Abstract-Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, most of these networks are based on a wired technology, which supports these requirements. Furthermore, this technology simplifies the security management of the network since certain assumptions can be safely made, including the inability of an attacker to access the network, and the fact that it is almost impossible for an attacker to introduce a node into the network. The proposal for Avionics… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…In the case of detection systems, co-location proofs were proposed to act against routing attacks by [142], [143]. The authors of [143] discussed the security services applied in the link layer including E2E security, while the authors of [144] proposed secure channel protocols to ensure robust communication. For securing the network layers of drone and IoT collaborative set-ups, the authors of [134] discussed secure routing, IP security, and secure transportation.…”
Section: Privacy and Security Issues In Drones And Iot Collaboramentioning
confidence: 99%
“…In the case of detection systems, co-location proofs were proposed to act against routing attacks by [142], [143]. The authors of [143] discussed the security services applied in the link layer including E2E security, while the authors of [144] proposed secure channel protocols to ensure robust communication. For securing the network layers of drone and IoT collaborative set-ups, the authors of [134] discussed secure routing, IP security, and secure transportation.…”
Section: Privacy and Security Issues In Drones And Iot Collaboramentioning
confidence: 99%
“…Significant efforts have been devoted to tackle these vulnerabilities through cryptography with contributions ranging from side by side comparisons of secure channel protocols for avionics [26] to general adversarial testing methodologies that propose a proactive approach to security to minimize the overall threats of IoT systems [27]. Furthermore, some protocols proposed shed light into practical implementation for the aeronautics [28], [29]. Despite these valuable contributions, ensuring security in a WSN through cryptography continues to be difficult due to the usually small payload messages, which lead to high overhead.…”
Section: B Network Securitymentioning
confidence: 99%
“…In the link/adoption layer, important security services have to be applied in the 6LoWPAN adoption layer, including end-to-end security, continuous authentication schemes [ 44 , 45 ], trust verification/validation, and key management mechanisms [ 37 ]. To provide robust communication and endpoint security, secure and trusted channel protocols were proposed in Reference [ 46 ]. Furthermore, group key management techniques were considered in Reference [ 38 ], aiming to enable multicast communication using CoAP.…”
Section: Overview On Uavs As Members Of Iotmentioning
confidence: 99%