2011
DOI: 10.1016/j.ijcip.2011.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of the ADS-B implementation in the next generation air transportation system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
112
0
5

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 214 publications
(117 citation statements)
references
References 4 publications
0
112
0
5
Order By: Relevance
“…Data is periodically sent for tracking purposes to air traffic control ground stations and other aircrafts [17]. Among the defined fields in the ADS-B scheme are flight ID, geolocation, time, speed and various other sensor readings.…”
Section: A Data Storage Communication and Modellingmentioning
confidence: 99%
“…Data is periodically sent for tracking purposes to air traffic control ground stations and other aircrafts [17]. Among the defined fields in the ADS-B scheme are flight ID, geolocation, time, speed and various other sensor readings.…”
Section: A Data Storage Communication and Modellingmentioning
confidence: 99%
“…La FAA esperaba que el sistema ADS-B conllevaría la sustitución total de los radares terrestres ya que un avión en el que el sistema estuviera disponible proveería tanto a controladores aéreos como a otros pilotos de actualizaciones más rápidas y fiables sobre información aérea, lo cual incrementaría la seguridad de los pilotos. Ello tendría un impacto directo sobre la reducción del espacio aéreo necesario entre aviones, incrementando la eficiencia de dicho espacio además de mejorar la fiabilidad del trabajo de los controladores (McCallie et al, 2011).…”
Section: El Proceso De Implementación Del Ads-b Se Desarrolló En Dos unclassified
“…Poor data link quality may result in delays in data transmission and path hijacking. Another cause of delayed data transmission could be a single or multiple UAV nodes storing the data are not available [8]. During asymmetric encryption, a public key is required for encryption and a private key is required for decryption.…”
Section: Multi-uav Networkmentioning
confidence: 99%