REFERENCES

1. Dave G, Choudhary G, Sihag V, You I, Choo KKR. Cyber security challenges in aviation communication, navigation, and surveillance. Computers & Security 2022;112:102516.

3. Ashdown LK. Preventing a cyber-9/11: how universal jurisdiction could protect international aviation in the digital age. J Air L & Com 2019;84: 3. Available from: https://scholar.smu.edu/jalc/vol84/iss1/2.

4. Shrestha R, Oh I, Kim S. A survey on operation concept, advancements, and challenging issues of urban air traffic management. Front Future Transp 2021;2:626935.

5. You IS, Sharma V, Choudhary G, KO YH. Method for verifying drone included in industrial internet of things system, by using petri-net modeling. Google Patents; 2021. US Patent App. 17/255, 497. Available from: https://patents.google.com/patent/US20210279339A1/en.

6. Choudhary G, Sharma V, You I. Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Computers & Electrical Engineering 2019;74:59-73.

7. Krishna CL, Murphy RR. A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR). IEEE; 2017. pp. 194–99.

8. Choudhary G, Sharma V, Gupta T, Kim J, You I. Internet of Drones (IoD): threats, vulnerability, and security perspectives. arXiv preprint arXiv: 180800203 2018. Available from: https://arxiv.org/abs/1808.00203.

9. Bajracharya R, Shrestha R, Jung H. Wireless infrastructure drone based on NR-U: a perspective. In: 2021 International Conference on Information and Communication Technology Convergence (ICTC). IEEE; 2021. pp. 834–38.

10. Choudhary G, Sharma V, You I, et al. Intrusion detection systems for networked unmanned aerial vehicles: a survey. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE; 2018. pp. 560–65.

11. Nguyen A, Amrhar A, Zambrano J, et al. Application of phase modulation for secure automatic dependent surveillance-broadcast. Available from: https://lassena.etsmtl.ca/relanlassena/IMG/pdf/-144.pdf.

12. Santamarta R. A wake-up call for satcom security. Technical White Paper 2014. Available from: https://www.secnews.gr/wp-content/uploads/Files/Satcom_Security.pdf.

13. Santamarta R. SATCOM terminals: Hacking by air, sea, and land. DEFCON White Paper 2014. Available from: https://docs.huihoo.com/blackhat/usa-2014/us-14-Santamarta-SATCOM-Terminals-Hacking-By-Air-Sea-And-Land-WP.pdf.

14. Costin A, Francillon A. Ghost in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black Hat USA 2012: 1–12. Available from: https://s3.eurecom.fr/docs/bh12us_costin.pdf.

15. Schäfer M, Lenders V, Martinovic I. Experimental analysis of attacks on next generation air traffic communication. Springer; 2013.

16. Leonardi M, Piracci E, Galati G. ADS-B vulnerability to low cost jammers: Risk assessment and possible solutions. In: 2014 Tyrrhenian International Workshop on Digital Communications-Enhanced Surveillance of Aircraft and Vehicles (TIWDC/ESAV). IEEE; 2014. pp. 41–46.

17. Wireless Attack Launch Box;. https://github.com/crescentvenus/WALB.

18. Strohmeier M, Martinovic I, Lenders V. Securing the air–ground link in aviation. In: The Security of Critical Infrastructures. Springer; 2020. pp. 131–54.

19. Osechas O, Mostafa M, Graupl T, Meurer M. Addressing vulnerabilities of the CNS infrastructure to targeted radio interference. IEEE Aerosp Electron Syst Mag 2017;32:34-42.

20. Adamy D. EW 101: A first course in electronic warfare. vol. 101. Artech house; 2001. Available from: https://ieeexplore.ieee.org/abstract/document/9100068.

21. Adamy D. EW 102: a second course in electronic warfare. Artech House; 2004. Available from: https://ieeexplore.ieee.org/abstract/document/9100226.

22. Adamy D. EW 103: Tactical battlefield communications electronic warfare. Artech House; 2008.

23. [Moser D, Leu P, Lenders V, et al. Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. In: Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking; 2016. pp. 375–86.

24. Shang F, Wang B, Yan F, Li T. Multidevice false data injection attack models of ADS-B multilateration systems. Security and Communication Networks 2019;2019:1-11.

25. Stelkens-Kobsch TH, Hasselberg A, Mühlhausen T, et al. Towards a more secure ATC voice communications system. In: 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE; 2015. pp. 4C1.

26. Melbourne Airport hoax caller Paul Sant pleads guilty to making fake flight calls, aborting Virgin landing. https://www.abc.net.au/news/2017-09-05/melbourne-airport-hoax-caller-paul-sant-pleads-guilty/8873984.

28. Di Marco D, Manzo A, Ivaldi M, Hird J. Security testing with controller-pilot data link communications. In: 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE; 2016. pp. 526–31.

29. Teso H. Aircraft hacking: Practical aero series. In: 4th Hack in the Box Security Conference in Europe; 2013. Available from: https://www.pnc-contact.com/doc/Hugo%20Teso%20-%20Aircraft%20Hacking.pdf.

30. Blanchet B. Symbolic and computational mechanized verification of the ARINC823 avionic protocols. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE; 2017. pp. 68–82.

31. Risley C, McMath J, Payne B. Experimental encryption of aircraft communications addressing and reporting system (ACARS) aeronautical operational control (AOC) messages. In: 20th DASC. 20th Digital Avionics Systems Conference (Cat. No. 01CH37219). vol. 2. IEEE; 2001. pp. 7D4/1-7D4/8.

32. Zhang R, Liu G, Liu J, Nees JP. Analysis of message attacks in aviation data-link communication. IEEE Access 2018;6:455-63.

33. Wernberg M. Security and privacy of controller pilot data link communication; 2018. Available from: https://www.diva-portal.org/smash/get/diva2:1305189/FULLTEXT01.pdf.

34. Smith M, Strohmeier M, Lenders V, Martinovic I. On the security and privacy of ACARS. In: 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE; 2016. pp. 1–27. Available from: https://pdfs.semanticscholar.org/7ad9/83c960d531968355647d68e3f116cccbe55c.pdf.

35. Comendador FG, Valdes RA, PerezSanz L. Evolution of Air Traffic Services in Spain for the European Single Sky regulation. IEEE Aerosp Electron Syst Mag 2011;26:23-9.

36. Strohmeier M, Schäfer M, Pinheiro R, Lenders V, Martinovic I. On perception and reality in wireless air traffic communication security. IEEE Trans Intell Transport Syst 2016;18:1338.

37. Exploited ADS-B Information Exposed. Online flight tracking provides interesting details about Russian air bridge to Syria. https://theaviationist.com/2015/09/11/ads-b-exposes-russian-air-bridge-to-syria/.

38. Hoffman D, Rezchikov S. Busting the BARR: Tracking "untrackable" private aircraft for fun & profit. DEF CON 2012;20.

39. Pöpper C, Tippenhauer NO, Danev B, Capkun S. Investigation of signal and message manipulations on the wireless channel. In: European Symposium on Research in Computer Security. Springer; 2011. pp. 40–59.

40. Wilhelm M, Schmitt JB, Lenders V. Practical message manipulation attacks in IEEE 802.15.4 wireless networks. In: MMB & DFT 2012 Workshop Proceedings; 2012. pp. 29–31. Available from: https://www.lenders.ch/publications/conferences/Pilates12.pdf.

41. Flight Aware Live Flight Tracking;. https://uk.flightaware.com/live/.

42. Flightradar24 Live Air Traffic. http://flightradar24.com.

43. Wilhelm M, Martinovic I, Schmitt JB, Lenders V. Short paper: reactive jamming in wireless networks: how realistic is the threat? In: Proceedings of the fourth ACM conference on Wireless network security; 2011. pp. 47–52.

44. Zhou X, Song L, Zhang Y. Physical layer security in wireless communications. Crc Press; 2013. Available from: http://users.jyu.fi/timoh/TIES327/WPLS.pdf.

45. Baker R, Martinovic I. Secure location verification with a mobile receiver. In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy; 2016. pp. 35–46.

46. Schäfer M, Leu P, Lenders V, Schmitt J. Secure motion verification using the doppler effect. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks; 2016. pp. 135–45.

47. Wang W, Chen G, Wu R, Lu D, Wang L. A low-complexity spoofing detection and suppression approach for ADS-B. In: 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS). IEEE; 2015. pp. K2–1.

48. Murphy TA, Harris WM. Device, system and methods using angle of arrival measurements for ADS-B authentication and navigation. Google Patents; 2019. US Patent 10, 365, 374. Available from: https://patents.google.com/patent/US9476962B2/en.

49. Fantacci R, Menci S, Micciullo L, Pierucci L. A secure radio communication system based on an efficient speech watermarking approach. Security Comm Networks 2009;2:305-14.

50. Hagmüller M, Hering H, Kröpfl A, Kubin G. Speech watermarking for air traffic control. In: 2004 12th European Signal Processing Conference. IEEE; 2004. pp. 1653–56.

51. Strohmeier M, Martinovic I. On passive data link layer fingerprinting of aircraft transponders. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy; 2015. pp. 1–9.

52. Finke M, Stelkens-Kobsch TH. A practical example for validation of ATM security prototypes. CEAS Aeronautical Journal 2018;9:157-70.

53. Nuseibeh B, Haley CB, Foster C. Securing the skies: In requirements we trust. Computer 2009;42:64-72.

54. Montefusco P, Casar R, Koelle R, Stelkens-Kobsch TH. Addressing security in the ATM environment: from identification to validation of security countermeasures with introduction of new security capabilities in the ATM system context. In: 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE; 2016. pp. 532–41.

55. Mahmoud MSB, Pirovano A, Larrieu N. Aeronautical communication transition from analog to digital data: A network security survey. Computer Science Review 2014;11:1-29.

56. Nguyen D, Shelton JW, Mitchell TM. System and method for evaluating cyber-attacks on aircraft. Google Patents; 2017. US Patent 9, 836, 990. Available from: https://patents.google.com/patent/US9836990B2/en.

57. Smith M, Strohmeier M, Harman J, Lenders V, Martinovic I. Safety vs. security: Attacking avionic systems with humans in the loop. arXiv preprint arXiv: 190508039 2019.

58. Strand DA. Automatic dependent surveillance: broadcast (ADS-B) vulnerabilities. Utica College; 2017.

59. Viveros CAP. Analysis of the cyber attacks against ADS-B perspective of aviation experts. Master's thesis, University of Tartu; 2016. Available from: https://core.ac.uk/reader/83597530.

60. Jochum JR. Encrypted mode select ADS-B tactical military situational awareness. MASSACHUSETTS INST OF TECH CAMBRIDGE DEPT OF ELECTRICAL ENGINEERING AND …; 2001. Available from: https://apps.dtic.mil/sti/citations/ADA402100.

61. McParland T, Patel V, Hughes W. Securing air-ground communications. In: 20th DASC. 20th Digital Avionics Systems Conference (Cat. No. 01CH37219). vol. 2. IEEE; 2001. pp. 7A7/1-7A7/9.

62. Olive M. Efficient datalink security in a bandwidth-limited mobile environment-an overview of the Aeronautical Telecommunications Network (ATN) security concept. In: 20th DASC. 20th Digital Avionics Systems Conference (Cat. No. 01CH37219). vol. 2. IEEE; 2001. pp. 9E2/1-9E2/10.

63. Hableel E, Baek J, Byon YJ, Wong DS. How to protect ADS-B: Confidentiality framework for future air traffic communication. In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE; 2015. pp. 155–60.

64. Yang A, Tan X, Baek J, Wong DS. A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification. IEEE Transactions on Services Computing 2015;10:165-75.

65. Agbeyibor R, Butts J, Grimaila M, Mills R. Evaluation of format-preserving encryption algorithms for critical infrastructure protection. In: International Conference on Critical Infrastructure Protection. Springer; 2014. pp. 245–61.

66. Finke C, Butts J, Mills R. ADS-B encryption: confidentiality in the friendly skies. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop; 2013. pp. 1–4.

67. Finke C, Butts J, Mills R, Grimaila M. Enhancing the security of aircraft surveillance in the next generation air traffic control system. International Journal of Critical Infrastructure Protection 2013;6:3-11.

68. Berthier P, Fernandez JM, Robert JM. Sat: Security in the air using tesla. In: 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC). IEEE; 2017. pp. 1–10.

69. Martinovic I, Strohmeier M. On the Security of the Automatic Dependent Surveillance- Broadcast Protocol. IEEE Commun Surv Tutorials 2015;17:1066-87.

70. Lee SH, Han JW, Lee DG. The ADS-B protection method for next-generation air traffic management system. In: Ubiquitous Computing Application and Wireless Sensor. Springer; 2015. pp. 105–13.

71. Yue M, Wu X. The approach of ACARS data encryption and authentication. In: 2010 International Conference on Computational Intelligence and Security. IEEE; 2010. pp. 556–60.

72. Arora A, Yadav SK. Batman: Blockchain-based aircraft transmission mobile ad hoc network. In: Proceedings of 2nd International Conference on Communication, Computing and Networking. Springer; 2019. pp. 233–40.

73. Reisman R. Blockchain serverless public/private key infrastructure for ADS-B security, authentication, and privacy. In: AIAA Scitech 2019 Forum; 2019. p. 2203.

74. Fouda RM. Security vulnerabilities of cyberphysical unmanned aircraft systems. IEEE Aerosp Electron Syst Mag 2018;33:4-17.

75. Ukwandu E, Ben-Farah MA, Hindy H, Bures M, Atkinson R, et al. Cyber-security challenges in aviation industry: a review of current and future trends. Information 2022;13:146.

76. Sihag V, Vardhan M, Singh P. BLADE: robust malware detection against obfuscation in android. Forensic Science International: Digital Investigation 2021;38:301176.

77. Sihag V, Vardhan M, Singh P, Choudhary G, Son S. De-lady: Deep learning based android malware detection using dynamic features. Journal of Internet Services and Information Security (JISIS) 2021;11:34-45.

78. Sihag V, Choudhary G, Vardhan M, Singh P, Seo JT. PICAndro: Packet InspeCtion-Based Android Malware Detection. Security and Communication Networks 2021;2021:1-11.

79. Sihag V, Vardhan M, Singh P. A survey of android application and malware hardening. Computer Science Review 2021;39:100365.

80. Gurtov A, Polishchuk T, Wernberg M. Controller–pilot data link communication security. Sensors (Basel) 2018;18:1636.

81. Sathaye H, Schepers D, Ranganathan A, Noubir G. Wireless attacks on aircraft landing systems. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks. ACM; 2019. pp. 295–97.

82. McCallie D, Butts J, Mills R. Security analysis of the ADS-B implementation in the next generation air transportation system. International Journal of Critical Infrastructure Protection 2011;4:78-87.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/