Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 3 Sayı: 2, 135 - 143, 30.09.2019
https://doi.org/10.30516/bilgesci.405074

Öz

Kaynakça

  • [1] J. Hird, M. Hawley and C. Machin, ”Air Traffic Management Security Research in SESAR,” 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, 2016, pp. 486-492.
  • [2] P. Skaves, ”FAA Aircraft Systems Information Security Protection overview,” 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), Herdon, VA, 2015, pp. A1-1-A1-17.
  • [3] M. Rusko and M. Finke, ”Using speech analysis in voice communication: A new approach to improve air traffic management security,” 2016 7th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Wroclaw, 2016, pp. 000181-000186.
  • [4] M. Monteiro, T. Sarmento, A. Barreto, P. Costa and M. Hieb, ”An integrated mission and cyber simulation for Air Traffic Control,” 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, 2016, pp. 2687-2692.
  • [5] Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, Computers and Electrical Engineering, Volume 39, Issue 1, January 2013, Pages 34-46.
  • [6] S. Pradhan et al., ”Establishing Secure Interactions across Distributed Applications in Satellite Clusters,” 2014 IEEE International Conference on Space Mission Challenges for Information Technology, Laurel MD, 2014, pp. 67-74.
  • [7] Angelo Corsaro, ”The DDS Tutorial” http://download.prismtech.com/docs/Vortex/pdfs/OpenSplice_DDSTutorial.pdf
  • [8] CSFI volunteers, ”CSFI ATC (Air Traffic Control) Cyber security Project”,July 16, 2015, https://scadahacker.com/library/Documents/Case_Studies/CSFI%20-%20ATC%20Cyber%20Security%20Project.pdf
  • [9] Jon Gilbert, Scott Boden, Roger Atkinson, ”Aircraft data and voice communications system and method”, February 13, 2003.
  • [10]https://www.ead.eurocontrol.int/eadcms/eadsite/evolutions/aimsl.html
  • [11] https://arstechnica.com/tech-policy/2015/03/us-air-traffic-control-computer-system-vulnerable-to-terrorist-hackers/
  • [12] http://www.gao.gov/assets/670/668169.pdf
  • [13] https://ecfsapi.fcc.gov/file/7021694523.pdf
  • [14] http://securityaffairs.co/wordpress/40975/hacking/easa-airplane-hacking.html
  • [15] http://securityaffairs.co/wordpress/13625/hacking/hijacking-planes-navigation-system-with-android-reality-or-unnecessary-alarm.html
  • [16] http://www.securityweek.com/fbi-says-researcher-admitted-hacking-airplane-mid-flight
  • [17] http://abcnews.go.com/US/story?id=95993&page=1
  • [18] https://mods-n-hacks.gadgethacks.com/how-to/hack-transistor-radio-hear-air-traffic-control-232754/
  • [19]https://www.npr.org/sections/alltechconsidered/2012/08/16/158758161/could-the-new-air-traffic-control-system-be-hacked
  • [20] https://www.airport-technology.com/features/featureair-traffic-control-easy-target-hackers/
  • [21] https://www.theverge.com/2017/11/23/16694118/mr-robot-hack-report-s3e7-fredrick-tanya

Air Traffic Security against Cyber Threats

Yıl 2019, Cilt: 3 Sayı: 2, 135 - 143, 30.09.2019
https://doi.org/10.30516/bilgesci.405074

Öz

Air
Traffic Management (ATM) security is amongst major topics of safety critical
systems and issues of both civil aviation and military defense units. The
dramatic increase in the number of the aircrafts and the innovative technology
that provides smaller and sustainable air vehicles make the air communication
protocols and methods as a high profile potential target for black hat hackers.
There are lots of communication protocols and different systems between air to
ground (A2G) station and air to air (A2A). These include set of information
such as aircraft communication data, voice information and flight planning
which works on some protocols. All of radar detection and chasing systems are
also using similar techniques. The Data Distribution Service (DDS) is a
protocol for data transfer to each node. The communication systems can be
protected from third party system or hackers to some extent. The security is
coming from that point. Each components have own security using valid and
standard methods. Our approach in this study, enforces reasonable and
applicable security concepts and techniques for a robust and resillient air
traffic.

Kaynakça

  • [1] J. Hird, M. Hawley and C. Machin, ”Air Traffic Management Security Research in SESAR,” 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, 2016, pp. 486-492.
  • [2] P. Skaves, ”FAA Aircraft Systems Information Security Protection overview,” 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), Herdon, VA, 2015, pp. A1-1-A1-17.
  • [3] M. Rusko and M. Finke, ”Using speech analysis in voice communication: A new approach to improve air traffic management security,” 2016 7th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Wroclaw, 2016, pp. 000181-000186.
  • [4] M. Monteiro, T. Sarmento, A. Barreto, P. Costa and M. Hieb, ”An integrated mission and cyber simulation for Air Traffic Control,” 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, 2016, pp. 2687-2692.
  • [5] Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, Computers and Electrical Engineering, Volume 39, Issue 1, January 2013, Pages 34-46.
  • [6] S. Pradhan et al., ”Establishing Secure Interactions across Distributed Applications in Satellite Clusters,” 2014 IEEE International Conference on Space Mission Challenges for Information Technology, Laurel MD, 2014, pp. 67-74.
  • [7] Angelo Corsaro, ”The DDS Tutorial” http://download.prismtech.com/docs/Vortex/pdfs/OpenSplice_DDSTutorial.pdf
  • [8] CSFI volunteers, ”CSFI ATC (Air Traffic Control) Cyber security Project”,July 16, 2015, https://scadahacker.com/library/Documents/Case_Studies/CSFI%20-%20ATC%20Cyber%20Security%20Project.pdf
  • [9] Jon Gilbert, Scott Boden, Roger Atkinson, ”Aircraft data and voice communications system and method”, February 13, 2003.
  • [10]https://www.ead.eurocontrol.int/eadcms/eadsite/evolutions/aimsl.html
  • [11] https://arstechnica.com/tech-policy/2015/03/us-air-traffic-control-computer-system-vulnerable-to-terrorist-hackers/
  • [12] http://www.gao.gov/assets/670/668169.pdf
  • [13] https://ecfsapi.fcc.gov/file/7021694523.pdf
  • [14] http://securityaffairs.co/wordpress/40975/hacking/easa-airplane-hacking.html
  • [15] http://securityaffairs.co/wordpress/13625/hacking/hijacking-planes-navigation-system-with-android-reality-or-unnecessary-alarm.html
  • [16] http://www.securityweek.com/fbi-says-researcher-admitted-hacking-airplane-mid-flight
  • [17] http://abcnews.go.com/US/story?id=95993&page=1
  • [18] https://mods-n-hacks.gadgethacks.com/how-to/hack-transistor-radio-hear-air-traffic-control-232754/
  • [19]https://www.npr.org/sections/alltechconsidered/2012/08/16/158758161/could-the-new-air-traffic-control-system-be-hacked
  • [20] https://www.airport-technology.com/features/featureair-traffic-control-easy-target-hackers/
  • [21] https://www.theverge.com/2017/11/23/16694118/mr-robot-hack-report-s3e7-fredrick-tanya
Toplam 21 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Araştırma Makaleleri
Yazarlar

Ahmet Efe

Büşra Tuzlupınar Bu kişi benim

Ahmet Can Cavlan Bu kişi benim

Yayımlanma Tarihi 30 Eylül 2019
Kabul Tarihi 23 Temmuz 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 3 Sayı: 2

Kaynak Göster

APA Efe, A., Tuzlupınar, B., & Can Cavlan, A. (2019). Air Traffic Security against Cyber Threats. Bilge International Journal of Science and Technology Research, 3(2), 135-143. https://doi.org/10.30516/bilgesci.405074