2020
DOI: 10.1145/3377425
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Impact Analysis to Air Traffic Flows Through Dynamic Queue Networks

Abstract: Air traffic control increasingly depends on information and communication technology (ICT) to manage traffic flow through highly congested and increasingly interdependent airspace regions. While these systems are critical to ensuring the efficiency and safety of our airspace, they are also increasingly vulnerable to cyber threats that could potentially lead to reduction in capacity and/or reorganization of traffic flows. In this paper, we model various cyber threats to air traffic control systems, and analyze … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Considering the criticality of possible impacts that can be caused by ghost aircraft spoofing attacks, we adopted the primary criteria of our attack scenario based on the tangible impacts analyzed in [36] to the Arrival-Ground Movement-Departure (AGMOD) operations and also in [37] that probed impact to en-route aircraft. In another study on tactical flight diversion for mitigating risks of ADS-B ghost aircraft spoofing done by us recently [38], we refined the criteria which are:…”
Section: Ghost Aircraft Spoofing Attack Scenario: Highly Disruptive A...mentioning
confidence: 99%
See 2 more Smart Citations
“…Considering the criticality of possible impacts that can be caused by ghost aircraft spoofing attacks, we adopted the primary criteria of our attack scenario based on the tangible impacts analyzed in [36] to the Arrival-Ground Movement-Departure (AGMOD) operations and also in [37] that probed impact to en-route aircraft. In another study on tactical flight diversion for mitigating risks of ADS-B ghost aircraft spoofing done by us recently [38], we refined the criteria which are:…”
Section: Ghost Aircraft Spoofing Attack Scenario: Highly Disruptive A...mentioning
confidence: 99%
“…CAAM is of the opinion that the right combination of number and frequency will determine the impact and looks more real. The direct impact to the ATM are duration of flight delays and number of affected real aircraft, as demonstrated by [37]. Fig.…”
Section: ) Location Of Ghost Spoofing 2) Ghost Aircraft Behavior 3) A...mentioning
confidence: 99%
See 1 more Smart Citation
“…We know that the SCADA systems which control much of our critical national infrastructure are hugely vulnerable to cyber attack (Shaw 2004;Yadav and Paul 2019;Trend Micro 2019). Any IT-controlled system is potentially vulnerable to attack and disruption, with potentially catastrophic results; consider for example the likely outcome of a coordinated series of attacks on the air traffic control systems at major airports (Tamimi, Hahn, and Roy. 2020;Hird 2020).…”
Section: Introductionmentioning
confidence: 99%