2019 Integrated Communications, Navigation and Surveillance Conference (ICNS) 2019
DOI: 10.1109/icnsurv.2019.8735139
|View full text |Cite
|
Sign up to set email alerts
|

Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat- And Risk Analysis

Abstract: Currently Communication Navigation and Surveillance (CNS) in civil aviation are undergoing huge changes in the framework of the European SESAR and the US NextGEN research initiatives. One goal is to develop the Future Communication Infrastructure (FCI) for civil aviation, consisting of AeroMACs for airport communications, SatCOM for remote domains, and LDACS for long-range wireless digital communications. The trend towards digitalization is supposed to solve the problems of capacity shortage, frequency saturat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…2). Two different security mechanisms, proposed for LDACS in [33], were implemented to secure first the applications using pointto-point communications, i.e., CPDLC, ADS-C, and audio transmission, and second the applications using broadcasts, i.e., GBAS.…”
Section: Securitymentioning
confidence: 99%
“…2). Two different security mechanisms, proposed for LDACS in [33], were implemented to secure first the applications using pointto-point communications, i.e., CPDLC, ADS-C, and audio transmission, and second the applications using broadcasts, i.e., GBAS.…”
Section: Securitymentioning
confidence: 99%
“…This can be achieved by the STS [6] protocol together with different possible variations of the DHKE. In order to provide confidentiality, integrity, and authenticity protection of messages in transit AES-256 Galois Counter Mode (GCM) is applied [7].…”
Section: Bobmentioning
confidence: 99%
“…In Section II-B we already introduced the concept to make use of the STS protocol for LDACS, as already suggested in [6] and [7]. First we want to introduce the exact protocol run foreseen to be used for LDACS and then define message sizes for our emulation of latency times.…”
Section: Ldacs Certificate Based Authentication Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…In this work, performance comparisons have been carried out between the different mobility protocols, LISP-MN and MIPv6/SHIM6, in terms of handover signaling delay for both SDN-based and non-SDN-based architecture. Security-related issues were addressed in studies [ 18 , 19 , 20 ]. Among the studies on physical layer technology, adaptive modulation-coding (AMC) scheme was covered in [ 21 ].…”
Section: Introductionmentioning
confidence: 99%