Experimental Analysis of Attacks on Next Generation Air Traffic Communication
|
|
- Jeffry Clarke
- 5 years ago
- Views:
Transcription
1 Experimental Analysis of Attacks on Next Generation Air Traffic Communication Matthias Schäfer, Vincent Lenders and Ivan Martinovic June 27th, 2013
2 1. Introduction Introduction 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 1/14
3 1. Introduction Current Air Traffic Surveillance ATM crucial for avoiding collisions Technologies used since World War II: Primary Surveillance Radar Secondary Surveillance Radar (Mode A/C/S) But there are some major problems: Insufficient accuracy Expensive Expected doubling of traffic until 2025 NextGen (US) and CASCADE (Europe) Matthias Scha fer Attacks on NextGen Air Traffic Communication S. 2/14
4 1. Introduction 2020: NextGen Air Traffic Surveillance Automatic: no explicit interrogation necessary Dependant: aircraft determines its precise location in space on-board Surveillance: precise and up-to-date position, velocity, identification,... Automatic Dependent Surveillance Broadcast Aircraft continuously determine their position and velocity using GNSS Position, ID, velocity and status are broadcasted periodically GNSS ADS-B Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 3/14
5 1. Introduction Security in ADS-B does not exist! ADS-B Designed for cost efficiency and accuracy Legacy compatibility for a smooth transition 20 years from development to final deployment worldwide coordination and deployment Attacker Rapid technological progress Easily accessible knowledge Cheap equipment available off-the-shelf Attacks usually local, e.g. one ground station Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 4/14
6 2. Attacks Attacks 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 5/14
7 2. Attacks Attacks Passive attacks are trivial due to the lack of encryption But: passive attacks may support active attacks Active attacks: Injection of ghost aircraft Modification of the position of existing aircraft Jamming attacks Deletion of existing aircraft from the screen... Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 6/14
8 2. Attacks Example 1: Ghost aircraft injection Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 7/14
9 2. Attacks Example 2: Ghost aircraft flooding Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 8/14
10 3. Limitations Limitations 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 9/14
11 3. Limitations Passive Attacks Line-of-sight link Measuring Point 70 RSS (dbw) London Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 10/14
12 3. Limitations Active Attacks Message injection: P/N > δ (Selective) Message deletion: Timing: reacting time in the order of 100 µs Position: distance to attacked ground station 10 km Message modification: Timing: stricter than that of message deletion (few µs) Synchronization with the signal with a precision < 1 µs But: deletion + injection = modification Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 11/14
13 4. Discussion Discussion 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 12/14
14 4. Discussion Lessons learned? 1 Technological progress must be considered when designing new critical systems (especially cyber-physical systems) 2 Patches to secure the existing system needed until appropriate security measures are integrated 3 Manufacturers and authorities in the aviation sector should provide more information about infrastructure to support research 4 ATC should not rely on ADS-B exclusively Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 13/14
15 4. Discussion The End Thank you very much. Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 14/14
5/4/2016 ht.ttlms.com
Order Template Screen 1 Free Form Lesson Overview 2 Free Form Performance Based CNS Requirements 3 Free Form Performance Based CNS Requirements 4 Single Answer Knowledge Check 5 Free Form Related ICAO
More informationProtection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems
Information 2014, 5, 622-633; doi:10.3390/info5040622 Article OPEN ACCESS information ISSN 2078-2489 www.mdpi.com/journal/information Protection Method for Data Communication between ADS-B Sensor and Next-Generation
More informationElectronic Conspicuity and the GAINS Project. Julian Scarfe Bob Darby AGM 2018
Electronic Conspicuity and the GAINS Project Julian Scarfe Bob Darby AGM 2018 What is electronic conspicuity? ª Conventional: ground radar detects other aircraft pilots interpret traffic information from
More informationSAPR platforms and EW multifunctional technology needs. Sergio Attilio Jesi 18 of June 2015, Rome
SAPR platforms and EW multifunctional technology needs Sergio Attilio Jesi 18 of June 2015, Rome PROPRIETARY NOTICE The information contained in this docum ent is th e property of ELETTRONICA S.p.A. Use
More informationUsing LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages
Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages Edan Habler Asaf Shabtai Department of Software & Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva
More informationLTE Network Automation under Threat
LTE Network Automation under Threat Altaf Shaik *, Ravishankar Borgaonkar * Technische Universität Berlin and Kaitiaki Labs Email: altaf329@sect.tu-berlin.de SINTEF Digital and Kaitiaki Labs Email: rbbo@kth.se
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationAerospace Technology Congress 2016 Stockholm, Sweden
SESAR Aerospace Technology Congress 2016 Stockholm, Sweden Michael Standar, SESAR Joint Undertaking 2 ICAO projected global traffic scenario - 2040 The European ATM Master Plan SESAR - addressing global
More informationBoeing Communications Strategy
Boeing Communications Strategy Presentation to ATN2004 Rob Mead Date: September 15, 2004 Phone: 253-951-8447 Email: rob.mead@boeing.com Topics Data link in Boeing ATM concepts Boeing communications strategy
More informationTWELFTH AIR NAVIGATION CONFERENCE
International Civil Aviation Organization 7/5/12 WORKING PAPER ANConf.12.WP.007.en.docx TWELFTH AIR NAVIGATION CONFERENCE Montréal, 19 to 30 November 2012 Agenda Item 3: Interoperability and data through
More informationNextGen ATN-Brazil First deployed SDN in ATM
Air Traffic Management Lt. Colonel Belchior (CISCEA) & Stefan J. Galler (Frequentis) NetBroker ATM-gra remote tower video stream? 2 NextGen ATN-Brazil First deployed SDN in in ATM Public 2017 Frequentis
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationAviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE
Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Enabling Aircraft Safety With Comprehensive Technology MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING
More informationHow a global industry player addresses the Cybersecurity challenges of Air Transport
How a global industry player addresses the Cybersecurity challenges of Air Transport ICAO Cyber Summit and Exhibition Making Sense of Cyber Dubai, United Arab Emirates 4 6 April 2017 thomas.hutin@thalesgroup.com
More informationEuropean Aviation Safety Agency. European Technical Standard Order. ED Decision 2016/013/R Annex II
Date: 5.8.2016 European Aviation Safety Agency European Technical Standard Order Subject: Secondary Surveillance Radar Mode S Transponder 1 Applicability This ETSO provides the requirements which Secondary
More informationAIAA ANERS Radar Trajectory Processing Technique for Merged Data Sources. April 21, 2017 Prepared by Bao Tong. Federal Aviation Administration
AIAA ANERS 2017 Administration Radar Trajectory Processing Technique for Merged Data Sources April 21, 2017 Prepared by Bao Tong Federal 0 Aviation Administration 0 Introduction The FAA has access to multiple
More informationU.S. ADS-B Ground Infrastructure Program. January 28, 2010
U.S. ADS-B Ground Infrastructure Program January 28, 2010 ITT At a Glance A global, diversified manufacturing and engineering company headquartered in White Plains, NY A Fortune 300 company 40,000+ employees
More informationA New Algorithm for Automated Aircraft Conflict Resolution
A New Algorithm for Automated Aircraft Conflict Resolution Nour Dougui, Daniel Delahaye, and Stephane Puechmorel ENAC July 3, 2009 our Dougui, Daniel Delahaye, and Stephane Puechmorel A New Algorithm (ENAC)
More informationDISTRIBUTION OF CONFLICT DETECTION OF AIRCRAFT FOR NEXT GENERATION FLIGHT MANAGEMENT SYSTEMS. A Thesis. Presented to
DISTRIBUTION OF CONFLICT DETECTION OF AIRCRAFT FOR NEXT GENERATION FLIGHT MANAGEMENT SYSTEMS A Thesis Presented to the Faculty of California Polytechnic State University San Luis Obispo In Partial Fulfillment
More informationMARINE AIR TRAFFIC CONTROL AND LANDING SYSTEM TACTICAL AIR TRAFFIC CONTROL USING A DISTRIBUTED SYSTEM ARCHITECTURE. Bill Ganz
MARINE AIR TRAFFIC CONTROL AND LANDING SYSTEM TACTICAL AIR TRAFFIC CONTROL USING A DISTRIBUTED SYSTEM ARCHITECTURE Bill Ganz Sperry Corporation, St. Paul, MN A Legacy Project re-print Practically everyone
More informationInmarsat BGAN. Presentation to EBU Networks 2007 To IP and Beyond. 19 th June Alan Howell Director, Network and Systems Engineering
Inmarsat BGAN Presentation to EBU Networks 2007 To IP and Beyond 19 th June 2007 Alan Howell Director, Network and Systems Engineering Outline of Presentation About Inmarsat Broadband Global Area Network
More informationAttacks on WLAN Alessandro Redondi
Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationA NEW ADS-B AUTHENTICATION FRAMWORK FOR SIGNATURE VERIFICATION
A NEW ADS-B AUTHENTICATION FRAMWORK FOR SIGNATURE VERIFICATION Mrs.R.Devi 1, Ms.Ramani.S 2, Ms.Asha.G 3 1 Professor,CSE, Panimalar engineering college, TAMILNADU, INDIA 2 UG Scholar,CSE, Panimalar engineering
More informationTERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 11
RTCA Paper No. 009-19/PMC-1844 TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 11 REQUESTORS: Organization FAA ATC Communications Services Jim
More informationConnecting a Mobile York Region
Connecting a Mobile York Region Presentation to ITS Canada Victoria 2014 Gregg Loane, P.Eng. June 1, 2014 Connecting a Mobile York Region Overview Who is York Region? York s ITS Program Background Data
More informationACARE WG 4 Security Overview
ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationAMCP/4-WP/70. b) requirements and recommendations together with their rationale; and
Appendix A to the Report on Agenda Item 3 3A-1 APPENDIX A VHF DIGITAL LINK (VDL) DESIGN GUIDELINES 1. INTRODUCTION 1.1 In the absence of a comprehensive and detailed set of operational requirements, the
More informationTERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 10
TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 10 REQUESTORS: Organization FAA ATC Communications Services Jim Eck Person SC LEADERSHIP: Position
More informationInternational Civil Aviation Organization. AIDC Review Task Force Meeting. Brisbane, Australia, March 2003
AIDC/R TF/IP/3 International Civil Aviation Organization AIDC Review Task Force Meeting Brisbane, Australia, 27-28 March 2003 Agenda Item 2: Agenda Item 4: Review of experience gained and lessons learned
More informationRemote towers in demanding environments
Air Traffic Management Defence Remote towers in demanding environments Experiences gained by common DFS/ Frequentis project Remote tower project DFS DFS/Frequentis validation experiences Frequentis smartvision
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationDevelopment of the SPI Regulation
Development of the SPI Regulation EC Workshop on the implementation of SPI Luc TYTGAT Director Pan-European Single Sky 07 March 2014 Introduction The SPI regulation was developed in close collaboration
More informationADS-B Data Authentication Based on ECC and X.509 Certificate
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 10, NO. 1, MARCH 2012 51 Data Authentication Based on ECC and X.509 Certificate Wei-Jun Pan, Zi-Liang Feng, and Yang Wang Abstract An automatic dependent
More informationLarge-Scale Flight Phase identification from ADS-B Data Using Machine Learning Methods
Large-Scale Flight Phase identification from ADS-B Data Using Methods Junzi Sun 06.2016 PhD student, ATM Control and Simulation, Aerospace Engineering Large-Scale Flight Phase identification from ADS-B
More informationWhen the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft
When the Lights go out Hacking Cisco EnergyWise Version: 1.0 Date: 7/1/14 Classification: Author(s): Public Ayhan Koca, Matthias Luft TABLE OF CONTENT 1 HANDLING... 5 1.1 DOCUMENT STATUS AND OWNER... 5
More informationDepartment of Homeland Security
Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency
More informationFrom Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com
From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,
More informationICB Industry Consultation Body
ICB Industry Consultation Body POSITION PAPER Regulatory Response to ATM Cyber-Security Increasing reliance on inter-connected ATM systems, services and technologies increases the risk of cyber-attacks.
More informationAdvanced SensorNet Technologies to Monitor Trusted Corridors. A KTEC Center of Excellence 1
Advanced Net Technologies to Monitor Trusted Corridors 1 Tasks Intermodal Technology Proof of Concept and Integration of the SmartPort Trade Data Exchange Architecture and Net Technologies System modeling,
More informationThe modernisation of ATM in Europe
The modernisation of ATM in Europe Gzim Ocakoglu European Commission DG MOVE/E2 AEE Conference, 26 April 2016, München 1 Air transport is a key component of the European transport system Generating benefits
More informationPresentation of Iris. ART-Workshop 'CNS and Infrastructure 13 th March 2018
Presentation of Iris ART-Workshop 'CNS and Infrastructure 13 th March 2018 1. Inmarsat Eco system 2. Aviation 3. SwiftBroadband - Safety (SB-S) 4. Iris 2 1. Inmarsat Eco system 2. Aviation 3. SwiftBroadband
More informationRapidly deployable secure cellular comms
Rapidly deployable secure cellular comms Delivering global protection Capability Overview SMARTLINK is a rapidly deployable, scalable, low size, weight and power (SWAP) cellular network-in-a-box for demanding
More informationInmarsat Global Xpress. Global, Mobile, Trusted.
Inmarsat Global Xpress Global, Mobile, Trusted. The New Standard in Mobile Satellite Communications Global Xpress Changes Everything: Worldwide wideband coverage Seamless mobile roaming Interoperable with
More informationThe outline of the CONOPS
The outline of the CONOPS CS#9 - Data Communication Services (DCS) Philippe Renaud CS9 Project Manager 25 Oct 2013 CS9 Context A/G datalink mandated by EC No 29/2009 More ANSPs to be connected More ATN/VDL
More informationAirborne Internet / Collaborative Information Environment
Airborne Internet / Collaborative Information Environment A presentation to AIG/WG By the Airborne Internet Collaboration/Working Group Randy.Schmidt@NGC.com presenting avsseminars.blogspot.com avs 997
More informationSpace for safe skies. ESA Iris Program. Satellite Communications for Air Traffic Management (ATM)
Space for safe skies ESA Iris Program Satellite Communications for Air Traffic Management (ATM) 23rd Ka-Band Broadband and 35th AIAA ICSSC Conference 18/10/2017 Slide 1 Satellite Communications for the
More informationCYBER SECURITY AIR TRANSPORT IT SUMMIT
CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER
More informationTroubleshooting and Cyber Protection Josh Wheeler
May 4, 2016 Troubleshooting and Cyber Protection Josh Wheeler Network Security Network Security Risks Video Network Security Risks Article Network Security Risks Data stealing or disruption of network
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationActionable Intelligence for the Challenges of Tomorrow!
Actionable Intelligence for the Challenges of Tomorrow! The Power of the Airbus Group Airbus Group As part of the Airbus group, we benefit from the power and strength of a global leader in aerospace, defence
More informationModeling Aircraft Performance Parameters with Open ADS-B Data
Twelfth USA/Europe Air Traffic Management Research and Development Seminar Modeling Aircraft Performance Parameters with Open ADS-B Data Junzi Sun, Joost Ellerbroek, Jacco Hoekstra Delft University of
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationUAS Operation in National Air Space (NAS) Secure UAS Command and Control
UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,
More informationDF NÚCLEO Airfield Ground Lighting & Energy Systems
DF NÚCLEO Airfield Ground Lighting & Energy Systems CONTENTS DF Núcleo Company Profile Airfield Ground Lighting and Energy Systems References Company Profile Who we are is one of the Spanish companies
More informationThe Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1
The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber
More informationWhite paper: Seamless migration
White paper: Seamless migration Moving towards the ATM networks of the future while maintaining today s quality of service The clock is ticking for air navigation service providers (ANSPs), with a combination
More informationAssessing the Impact of Aviation Security on Cyber Power
2016 8th International Conference on Cyber Conflict Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of this publication
More informationARPA Mobile Information Systems Applications Workshop December 7-8, Mobile Networking
ARPA Mobile Information Systems Applications Workshop December 7-8, 1995 Mobile Networking Randy H. Katz CS Division EECS Department University of California, Berkeley 1 Mobile Networking Middleware Reliable
More informationSensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016
Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused
More informationFinal Project Report. Abstract. Document information
Final Project Report Document information Project Title Improved 1090 MHz ADS-B Ground station capacity and security Project Number 15.04.06 Project Manager Thales Deliverable Name Final Project Report
More informationCedar Rapids ITS Deployment Project
Cedar Rapids ITS Deployment Project Concept of Operations July 29, 2011 Table of Contents Section 1 Introduction Purpose Goal of ITS Deployments Section 2 Needs Assessment General Background Stakeholders
More informationICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region
ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region An overview on Pan European Network Service - PENS Lima, Peru 10 to 12 Septiembre de
More informationWhite paper: ATM-grade networks
White paper: ATM-grade networks Achieving safe, efficient, future-ready air traffic control communications Frequentis was instrumental in introducing ATM-grade networks to the air traffic control industry,
More informationDatalink performances
Datalink performances Outcome of the Datalink Performance Monitoring activities Jacky Pouzet Head of Communication and Frequency Coordination Unit WAC Madrid, March 2018 The Big Picture EC EASA Reminder:
More informationSURVEILLANCE DATA EXCHANGE. Part 5 : Category 017. Mode S Surveillance Coordination Function Messages
EUROPEAN ORGANISATION FOR THE SAFETY OF AIR NAVIGATION E U R O C O N T R O L EUROCONTROL STANDARD DOCUMENT FOR SURVEILLANCE DATA EXCHANGE Part 5 : Category 017 Mode S Surveillance Coordination Function
More informationC UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14
Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives
More informationINDONESIA S GEOSPATIAL DATA INFRASTRUCTURE
INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE Antonius B. Wijanarto Head of Center for Geodetic Control Network and Geodynamics GEOSPATIAL INFORMATION AGENCY srgi@big.go.id ONE GEO.REFERENCE (One Map Policy)
More informationAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationARINC Project Initiation/Modification (APIM)
Project Initiation/Modification proposal for the AEEC Proposed: October 11, 2016 ARINC Project Initiation/Modification (APIM) 1.0 Name of Proposed Project APIM 17-001 Internet Protocol version 6 (IPv6)
More informationSixth Meeting of CNS/MET Sub-Group of APANPIRG
CNS/MET/SG/6-IP/32 International Civil Aviation Organization Sixth Meeting of CNS/MET Sub-Group of APANPIRG Bangkok, Thailand, 15-19 July 2002 Agenda Item 3: ATN transition planning TECHNICAL DOCUMENT
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationEnhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationREPORT ON AGENDA ITEM 4
15/2/00 AERONAUTICAL TELECOMMUNICATION NETWORK PANEL (ATNP) THIRD MEETING Montreal, 7 to 18 February 2000 Agenda Item 4: Review of existing technical and procedural provisions relating to the aeronautical
More informationA Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed
A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed Michael Rosenstein / Frank Corvese Michael Rosenstein michael.rosenstein@securedecisions.com 631.759.3910
More informationEUROMED GNSS II/MEDUSA project
EUROMED GNSS II/MEDUSA project PBN Implementation Workshop / Go Team PBN Implementation Workshop / Go Team, Tunis, February 2014 1 Contents Euromed GNSS European GNSS (E GNSS), EGNOS and Galileo Euromed
More informationTitle: Planning AWS Platform Security Assessment?
Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning
More informationORCA OPTICAL AND RADIO-FREQUENCY
1 Lyssandre Rammos Co-Founder & Head of Aviation Certification ORCA OPTICAL AND RADIO-FREQUENCY CONSTELLATIONS PROPRIETARY MATERIAL BELONGING ON TO ESA AIRCRAFT AND SKYFLOX B.V. SYSTEM SERVICE ARCHITECTURE
More informationCOMPLEX SYSTEMS ONE SOLUTION
Communications Products, Inc. United States Coast Guard Avaya IP Office Training DAY 4 LESSONS 11, 12 & 13 COMPLEX SYSTEMS ONE SOLUTION Lesson 11 Voice Mail Lesson Objective: To become familiar with IPO
More informationChapter 13 Location Privacy
Chapter 13 Location Privacy Security aspects of mobile communication Implicit addressing Pseudonyms Communication mixes [NetSec], WS 2007/2008 13.1 Security Aspects of Mobile Communication Mobile communication
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationWiMAX Security: Problems & Solutions
(JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a
More informationSecurity Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe
Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Talk Overview Security has been one of the great detractors for wireless technologies (and
More informationRegional telecommunication Networks for Integrated Telecommunications for Air Navigation Services
Regional telecommunication Networks for Integrated Telecommunications for Air Navigation Services Automation System and Integrated Telecommunications for Air Navigation Services/System-Wide Information
More informationCYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET?
CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET? Peter Armstrong, Hong Kong March 2015 GROWING FROM STRENGTH TO STRENGTH... WHY IT MATTERS IT IS A REAL PROBLEM AND IT IS PERVASIVE GOVERNMENTS
More informationHelping our customers master every decisive moment
Helping our customers master every decisive moment Thales Group overview www.thalesgroup.com MORE THAN Overview 65,000 employees 60 Countries. Global presence 797 million Self-funded R&D* 2017 * Does not
More informationExposing vulnerabilities in electric power grids: An experimental approach
Exposing vulnerabilities in electric power grids: An experimental approach International Journal of Critical Infrastructure Protection Luigi Coppolino, S. D Antonio, and L. Romano (Tropea, 24-26 Settembre
More informationLYNX MULTILINK SURVEILLANCE SYSTEM
Lynx Brochure 2-18-15_MB-2005-10.qxd 2/20/2015 11:16 AM Page 1 LYNX MULTILINK SURVEILLANCE SYSTEM Aviation Products Lynx Brochure 2-18-15_MB-2005-10.qxd 2/20/2015 11:16 AM Page 2 LYNX NGT-9000 The Lynx
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationEUROCONTROL PEGASUS*Plus: A frame for GNSS Data Evaluation
PEGASUS*Plus: A frame for GNSS Data Evaluation David Duchet, Ivan Konaktchiev Carsten Butzmuehlen, Andreas Lipp Eurocontrol Experimental Centre Introduction As part of the approval process for operations
More informationPT Unified Application Security Enforcement. ptsecurity.com
PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over
More informationthalesgroup.com NETWORK & INFRASTRUCTURE SYSTEMS NEXIUM SAT Your battlefield-proven partner Anytime, anywhere
thalesgroup.com NETWORK & INFRASTRUCTURE SYSTEMS NEXIUM SAT Your battlefield-proven partner Anytime, anywhere Battlefield-Proven Satellite Commun In a fast changing world with daily emerging new threats,
More informationNetwork Access Control and VoIP. Ben Hostetler Senior Information Security Advisor
Network Access Control and VoIP Ben Hostetler Senior Information Security Advisor Objectives/Discussion Points Network Access Control Terms & Definitions Certificate Based 802.1X MAC Authentication Bypass
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's
More informationAutomotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How
More informationTELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth«
REPUBLIC OF ALBANIA ELECTRONIC AND POSTAL COMMUNICATIONS AUTHORITY - AKEP TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth« SUMMARY What is Smart Grid Communications Networks
More informationIMPLEMENTATION ISSUES, CHALLENGES, LESSONS LEARNED FOR DATA LINK MONITORING
IMPLEMENTATION ISSUES, CHALLENGES, LESSONS LEARNED FOR DATA LINK MONITORING OPERATIONAL DATA LINK WORKSHOP 8-12 August Accra Josiah BACKOBI Regional Manager Safety & Flight Operations Operational Data
More information