Experimental Analysis of Attacks on Next Generation Air Traffic Communication

Size: px
Start display at page:

Download "Experimental Analysis of Attacks on Next Generation Air Traffic Communication"

Transcription

1 Experimental Analysis of Attacks on Next Generation Air Traffic Communication Matthias Schäfer, Vincent Lenders and Ivan Martinovic June 27th, 2013

2 1. Introduction Introduction 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 1/14

3 1. Introduction Current Air Traffic Surveillance ATM crucial for avoiding collisions Technologies used since World War II: Primary Surveillance Radar Secondary Surveillance Radar (Mode A/C/S) But there are some major problems: Insufficient accuracy Expensive Expected doubling of traffic until 2025 NextGen (US) and CASCADE (Europe) Matthias Scha fer Attacks on NextGen Air Traffic Communication S. 2/14

4 1. Introduction 2020: NextGen Air Traffic Surveillance Automatic: no explicit interrogation necessary Dependant: aircraft determines its precise location in space on-board Surveillance: precise and up-to-date position, velocity, identification,... Automatic Dependent Surveillance Broadcast Aircraft continuously determine their position and velocity using GNSS Position, ID, velocity and status are broadcasted periodically GNSS ADS-B Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 3/14

5 1. Introduction Security in ADS-B does not exist! ADS-B Designed for cost efficiency and accuracy Legacy compatibility for a smooth transition 20 years from development to final deployment worldwide coordination and deployment Attacker Rapid technological progress Easily accessible knowledge Cheap equipment available off-the-shelf Attacks usually local, e.g. one ground station Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 4/14

6 2. Attacks Attacks 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 5/14

7 2. Attacks Attacks Passive attacks are trivial due to the lack of encryption But: passive attacks may support active attacks Active attacks: Injection of ghost aircraft Modification of the position of existing aircraft Jamming attacks Deletion of existing aircraft from the screen... Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 6/14

8 2. Attacks Example 1: Ghost aircraft injection Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 7/14

9 2. Attacks Example 2: Ghost aircraft flooding Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 8/14

10 3. Limitations Limitations 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 9/14

11 3. Limitations Passive Attacks Line-of-sight link Measuring Point 70 RSS (dbw) London Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 10/14

12 3. Limitations Active Attacks Message injection: P/N > δ (Selective) Message deletion: Timing: reacting time in the order of 100 µs Position: distance to attacked ground station 10 km Message modification: Timing: stricter than that of message deletion (few µs) Synchronization with the signal with a precision < 1 µs But: deletion + injection = modification Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 11/14

13 4. Discussion Discussion 1 Introduction 2 Attacks 3 Limitations 4 Discussion Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 12/14

14 4. Discussion Lessons learned? 1 Technological progress must be considered when designing new critical systems (especially cyber-physical systems) 2 Patches to secure the existing system needed until appropriate security measures are integrated 3 Manufacturers and authorities in the aviation sector should provide more information about infrastructure to support research 4 ATC should not rely on ADS-B exclusively Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 13/14

15 4. Discussion The End Thank you very much. Matthias Schäfer Attacks on NextGen Air Traffic Communication S. 14/14

5/4/2016 ht.ttlms.com

5/4/2016 ht.ttlms.com Order Template Screen 1 Free Form Lesson Overview 2 Free Form Performance Based CNS Requirements 3 Free Form Performance Based CNS Requirements 4 Single Answer Knowledge Check 5 Free Form Related ICAO

More information

Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems

Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems Information 2014, 5, 622-633; doi:10.3390/info5040622 Article OPEN ACCESS information ISSN 2078-2489 www.mdpi.com/journal/information Protection Method for Data Communication between ADS-B Sensor and Next-Generation

More information

Electronic Conspicuity and the GAINS Project. Julian Scarfe Bob Darby AGM 2018

Electronic Conspicuity and the GAINS Project. Julian Scarfe Bob Darby AGM 2018 Electronic Conspicuity and the GAINS Project Julian Scarfe Bob Darby AGM 2018 What is electronic conspicuity? ª Conventional: ground radar detects other aircraft pilots interpret traffic information from

More information

SAPR platforms and EW multifunctional technology needs. Sergio Attilio Jesi 18 of June 2015, Rome

SAPR platforms and EW multifunctional technology needs. Sergio Attilio Jesi 18 of June 2015, Rome SAPR platforms and EW multifunctional technology needs Sergio Attilio Jesi 18 of June 2015, Rome PROPRIETARY NOTICE The information contained in this docum ent is th e property of ELETTRONICA S.p.A. Use

More information

Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages

Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages Edan Habler Asaf Shabtai Department of Software & Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva

More information

LTE Network Automation under Threat

LTE Network Automation under Threat LTE Network Automation under Threat Altaf Shaik *, Ravishankar Borgaonkar * Technische Universität Berlin and Kaitiaki Labs Email: altaf329@sect.tu-berlin.de SINTEF Digital and Kaitiaki Labs Email: rbbo@kth.se

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

Aerospace Technology Congress 2016 Stockholm, Sweden

Aerospace Technology Congress 2016 Stockholm, Sweden SESAR Aerospace Technology Congress 2016 Stockholm, Sweden Michael Standar, SESAR Joint Undertaking 2 ICAO projected global traffic scenario - 2040 The European ATM Master Plan SESAR - addressing global

More information

Boeing Communications Strategy

Boeing Communications Strategy Boeing Communications Strategy Presentation to ATN2004 Rob Mead Date: September 15, 2004 Phone: 253-951-8447 Email: rob.mead@boeing.com Topics Data link in Boeing ATM concepts Boeing communications strategy

More information

TWELFTH AIR NAVIGATION CONFERENCE

TWELFTH AIR NAVIGATION CONFERENCE International Civil Aviation Organization 7/5/12 WORKING PAPER ANConf.12.WP.007.en.docx TWELFTH AIR NAVIGATION CONFERENCE Montréal, 19 to 30 November 2012 Agenda Item 3: Interoperability and data through

More information

NextGen ATN-Brazil First deployed SDN in ATM

NextGen ATN-Brazil First deployed SDN in ATM Air Traffic Management Lt. Colonel Belchior (CISCEA) & Stefan J. Galler (Frequentis) NetBroker ATM-gra remote tower video stream? 2 NextGen ATN-Brazil First deployed SDN in in ATM Public 2017 Frequentis

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Enabling Aircraft Safety With Comprehensive Technology MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING

More information

How a global industry player addresses the Cybersecurity challenges of Air Transport

How a global industry player addresses the Cybersecurity challenges of Air Transport How a global industry player addresses the Cybersecurity challenges of Air Transport ICAO Cyber Summit and Exhibition Making Sense of Cyber Dubai, United Arab Emirates 4 6 April 2017 thomas.hutin@thalesgroup.com

More information

European Aviation Safety Agency. European Technical Standard Order. ED Decision 2016/013/R Annex II

European Aviation Safety Agency. European Technical Standard Order. ED Decision 2016/013/R Annex II Date: 5.8.2016 European Aviation Safety Agency European Technical Standard Order Subject: Secondary Surveillance Radar Mode S Transponder 1 Applicability This ETSO provides the requirements which Secondary

More information

AIAA ANERS Radar Trajectory Processing Technique for Merged Data Sources. April 21, 2017 Prepared by Bao Tong. Federal Aviation Administration

AIAA ANERS Radar Trajectory Processing Technique for Merged Data Sources. April 21, 2017 Prepared by Bao Tong. Federal Aviation Administration AIAA ANERS 2017 Administration Radar Trajectory Processing Technique for Merged Data Sources April 21, 2017 Prepared by Bao Tong Federal 0 Aviation Administration 0 Introduction The FAA has access to multiple

More information

U.S. ADS-B Ground Infrastructure Program. January 28, 2010

U.S. ADS-B Ground Infrastructure Program. January 28, 2010 U.S. ADS-B Ground Infrastructure Program January 28, 2010 ITT At a Glance A global, diversified manufacturing and engineering company headquartered in White Plains, NY A Fortune 300 company 40,000+ employees

More information

A New Algorithm for Automated Aircraft Conflict Resolution

A New Algorithm for Automated Aircraft Conflict Resolution A New Algorithm for Automated Aircraft Conflict Resolution Nour Dougui, Daniel Delahaye, and Stephane Puechmorel ENAC July 3, 2009 our Dougui, Daniel Delahaye, and Stephane Puechmorel A New Algorithm (ENAC)

More information

DISTRIBUTION OF CONFLICT DETECTION OF AIRCRAFT FOR NEXT GENERATION FLIGHT MANAGEMENT SYSTEMS. A Thesis. Presented to

DISTRIBUTION OF CONFLICT DETECTION OF AIRCRAFT FOR NEXT GENERATION FLIGHT MANAGEMENT SYSTEMS. A Thesis. Presented to DISTRIBUTION OF CONFLICT DETECTION OF AIRCRAFT FOR NEXT GENERATION FLIGHT MANAGEMENT SYSTEMS A Thesis Presented to the Faculty of California Polytechnic State University San Luis Obispo In Partial Fulfillment

More information

MARINE AIR TRAFFIC CONTROL AND LANDING SYSTEM TACTICAL AIR TRAFFIC CONTROL USING A DISTRIBUTED SYSTEM ARCHITECTURE. Bill Ganz

MARINE AIR TRAFFIC CONTROL AND LANDING SYSTEM TACTICAL AIR TRAFFIC CONTROL USING A DISTRIBUTED SYSTEM ARCHITECTURE. Bill Ganz MARINE AIR TRAFFIC CONTROL AND LANDING SYSTEM TACTICAL AIR TRAFFIC CONTROL USING A DISTRIBUTED SYSTEM ARCHITECTURE Bill Ganz Sperry Corporation, St. Paul, MN A Legacy Project re-print Practically everyone

More information

Inmarsat BGAN. Presentation to EBU Networks 2007 To IP and Beyond. 19 th June Alan Howell Director, Network and Systems Engineering

Inmarsat BGAN. Presentation to EBU Networks 2007 To IP and Beyond. 19 th June Alan Howell Director, Network and Systems Engineering Inmarsat BGAN Presentation to EBU Networks 2007 To IP and Beyond 19 th June 2007 Alan Howell Director, Network and Systems Engineering Outline of Presentation About Inmarsat Broadband Global Area Network

More information

Attacks on WLAN Alessandro Redondi

Attacks on WLAN Alessandro Redondi Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

A NEW ADS-B AUTHENTICATION FRAMWORK FOR SIGNATURE VERIFICATION

A NEW ADS-B AUTHENTICATION FRAMWORK FOR SIGNATURE VERIFICATION A NEW ADS-B AUTHENTICATION FRAMWORK FOR SIGNATURE VERIFICATION Mrs.R.Devi 1, Ms.Ramani.S 2, Ms.Asha.G 3 1 Professor,CSE, Panimalar engineering college, TAMILNADU, INDIA 2 UG Scholar,CSE, Panimalar engineering

More information

TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 11

TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 11 RTCA Paper No. 009-19/PMC-1844 TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 11 REQUESTORS: Organization FAA ATC Communications Services Jim

More information

Connecting a Mobile York Region

Connecting a Mobile York Region Connecting a Mobile York Region Presentation to ITS Canada Victoria 2014 Gregg Loane, P.Eng. June 1, 2014 Connecting a Mobile York Region Overview Who is York Region? York s ITS Program Background Data

More information

ACARE WG 4 Security Overview

ACARE WG 4 Security Overview ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

AMCP/4-WP/70. b) requirements and recommendations together with their rationale; and

AMCP/4-WP/70. b) requirements and recommendations together with their rationale; and Appendix A to the Report on Agenda Item 3 3A-1 APPENDIX A VHF DIGITAL LINK (VDL) DESIGN GUIDELINES 1. INTRODUCTION 1.1 In the absence of a comprehensive and detailed set of operational requirements, the

More information

TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 10

TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 10 TERMS OF REFERENCE Special Committee (SC) 214 Standards for Air Traffic Data Communication Services Revision 10 REQUESTORS: Organization FAA ATC Communications Services Jim Eck Person SC LEADERSHIP: Position

More information

International Civil Aviation Organization. AIDC Review Task Force Meeting. Brisbane, Australia, March 2003

International Civil Aviation Organization. AIDC Review Task Force Meeting. Brisbane, Australia, March 2003 AIDC/R TF/IP/3 International Civil Aviation Organization AIDC Review Task Force Meeting Brisbane, Australia, 27-28 March 2003 Agenda Item 2: Agenda Item 4: Review of experience gained and lessons learned

More information

Remote towers in demanding environments

Remote towers in demanding environments Air Traffic Management Defence Remote towers in demanding environments Experiences gained by common DFS/ Frequentis project Remote tower project DFS DFS/Frequentis validation experiences Frequentis smartvision

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Development of the SPI Regulation

Development of the SPI Regulation Development of the SPI Regulation EC Workshop on the implementation of SPI Luc TYTGAT Director Pan-European Single Sky 07 March 2014 Introduction The SPI regulation was developed in close collaboration

More information

ADS-B Data Authentication Based on ECC and X.509 Certificate

ADS-B Data Authentication Based on ECC and X.509 Certificate JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 10, NO. 1, MARCH 2012 51 Data Authentication Based on ECC and X.509 Certificate Wei-Jun Pan, Zi-Liang Feng, and Yang Wang Abstract An automatic dependent

More information

Large-Scale Flight Phase identification from ADS-B Data Using Machine Learning Methods

Large-Scale Flight Phase identification from ADS-B Data Using Machine Learning Methods Large-Scale Flight Phase identification from ADS-B Data Using Methods Junzi Sun 06.2016 PhD student, ATM Control and Simulation, Aerospace Engineering Large-Scale Flight Phase identification from ADS-B

More information

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft

When the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft When the Lights go out Hacking Cisco EnergyWise Version: 1.0 Date: 7/1/14 Classification: Author(s): Public Ayhan Koca, Matthias Luft TABLE OF CONTENT 1 HANDLING... 5 1.1 DOCUMENT STATUS AND OWNER... 5

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency

More information

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,

More information

ICB Industry Consultation Body

ICB Industry Consultation Body ICB Industry Consultation Body POSITION PAPER Regulatory Response to ATM Cyber-Security Increasing reliance on inter-connected ATM systems, services and technologies increases the risk of cyber-attacks.

More information

Advanced SensorNet Technologies to Monitor Trusted Corridors. A KTEC Center of Excellence 1

Advanced SensorNet Technologies to Monitor Trusted Corridors. A KTEC Center of Excellence 1 Advanced Net Technologies to Monitor Trusted Corridors 1 Tasks Intermodal Technology Proof of Concept and Integration of the SmartPort Trade Data Exchange Architecture and Net Technologies System modeling,

More information

The modernisation of ATM in Europe

The modernisation of ATM in Europe The modernisation of ATM in Europe Gzim Ocakoglu European Commission DG MOVE/E2 AEE Conference, 26 April 2016, München 1 Air transport is a key component of the European transport system Generating benefits

More information

Presentation of Iris. ART-Workshop 'CNS and Infrastructure 13 th March 2018

Presentation of Iris. ART-Workshop 'CNS and Infrastructure 13 th March 2018 Presentation of Iris ART-Workshop 'CNS and Infrastructure 13 th March 2018 1. Inmarsat Eco system 2. Aviation 3. SwiftBroadband - Safety (SB-S) 4. Iris 2 1. Inmarsat Eco system 2. Aviation 3. SwiftBroadband

More information

Rapidly deployable secure cellular comms

Rapidly deployable secure cellular comms Rapidly deployable secure cellular comms Delivering global protection Capability Overview SMARTLINK is a rapidly deployable, scalable, low size, weight and power (SWAP) cellular network-in-a-box for demanding

More information

Inmarsat Global Xpress. Global, Mobile, Trusted.

Inmarsat Global Xpress. Global, Mobile, Trusted. Inmarsat Global Xpress Global, Mobile, Trusted. The New Standard in Mobile Satellite Communications Global Xpress Changes Everything: Worldwide wideband coverage Seamless mobile roaming Interoperable with

More information

The outline of the CONOPS

The outline of the CONOPS The outline of the CONOPS CS#9 - Data Communication Services (DCS) Philippe Renaud CS9 Project Manager 25 Oct 2013 CS9 Context A/G datalink mandated by EC No 29/2009 More ANSPs to be connected More ATN/VDL

More information

Airborne Internet / Collaborative Information Environment

Airborne Internet / Collaborative Information Environment Airborne Internet / Collaborative Information Environment A presentation to AIG/WG By the Airborne Internet Collaboration/Working Group Randy.Schmidt@NGC.com presenting avsseminars.blogspot.com avs 997

More information

Space for safe skies. ESA Iris Program. Satellite Communications for Air Traffic Management (ATM)

Space for safe skies. ESA Iris Program. Satellite Communications for Air Traffic Management (ATM) Space for safe skies ESA Iris Program Satellite Communications for Air Traffic Management (ATM) 23rd Ka-Band Broadband and 35th AIAA ICSSC Conference 18/10/2017 Slide 1 Satellite Communications for the

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

Troubleshooting and Cyber Protection Josh Wheeler

Troubleshooting and Cyber Protection Josh Wheeler May 4, 2016 Troubleshooting and Cyber Protection Josh Wheeler Network Security Network Security Risks Video Network Security Risks Article Network Security Risks Data stealing or disruption of network

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

Actionable Intelligence for the Challenges of Tomorrow!

Actionable Intelligence for the Challenges of Tomorrow! Actionable Intelligence for the Challenges of Tomorrow! The Power of the Airbus Group Airbus Group As part of the Airbus group, we benefit from the power and strength of a global leader in aerospace, defence

More information

Modeling Aircraft Performance Parameters with Open ADS-B Data

Modeling Aircraft Performance Parameters with Open ADS-B Data Twelfth USA/Europe Air Traffic Management Research and Development Seminar Modeling Aircraft Performance Parameters with Open ADS-B Data Junzi Sun, Joost Ellerbroek, Jacco Hoekstra Delft University of

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

UAS Operation in National Air Space (NAS) Secure UAS Command and Control UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,

More information

DF NÚCLEO Airfield Ground Lighting & Energy Systems

DF NÚCLEO Airfield Ground Lighting & Energy Systems DF NÚCLEO Airfield Ground Lighting & Energy Systems CONTENTS DF Núcleo Company Profile Airfield Ground Lighting and Energy Systems References Company Profile Who we are is one of the Spanish companies

More information

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1 The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber

More information

White paper: Seamless migration

White paper: Seamless migration White paper: Seamless migration Moving towards the ATM networks of the future while maintaining today s quality of service The clock is ticking for air navigation service providers (ANSPs), with a combination

More information

Assessing the Impact of Aviation Security on Cyber Power

Assessing the Impact of Aviation Security on Cyber Power 2016 8th International Conference on Cyber Conflict Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of this publication

More information

ARPA Mobile Information Systems Applications Workshop December 7-8, Mobile Networking

ARPA Mobile Information Systems Applications Workshop December 7-8, Mobile Networking ARPA Mobile Information Systems Applications Workshop December 7-8, 1995 Mobile Networking Randy H. Katz CS Division EECS Department University of California, Berkeley 1 Mobile Networking Middleware Reliable

More information

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016 Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused

More information

Final Project Report. Abstract. Document information

Final Project Report. Abstract. Document information Final Project Report Document information Project Title Improved 1090 MHz ADS-B Ground station capacity and security Project Number 15.04.06 Project Manager Thales Deliverable Name Final Project Report

More information

Cedar Rapids ITS Deployment Project

Cedar Rapids ITS Deployment Project Cedar Rapids ITS Deployment Project Concept of Operations July 29, 2011 Table of Contents Section 1 Introduction Purpose Goal of ITS Deployments Section 2 Needs Assessment General Background Stakeholders

More information

ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region

ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region An overview on Pan European Network Service - PENS Lima, Peru 10 to 12 Septiembre de

More information

White paper: ATM-grade networks

White paper: ATM-grade networks White paper: ATM-grade networks Achieving safe, efficient, future-ready air traffic control communications Frequentis was instrumental in introducing ATM-grade networks to the air traffic control industry,

More information

Datalink performances

Datalink performances Datalink performances Outcome of the Datalink Performance Monitoring activities Jacky Pouzet Head of Communication and Frequency Coordination Unit WAC Madrid, March 2018 The Big Picture EC EASA Reminder:

More information

SURVEILLANCE DATA EXCHANGE. Part 5 : Category 017. Mode S Surveillance Coordination Function Messages

SURVEILLANCE DATA EXCHANGE. Part 5 : Category 017. Mode S Surveillance Coordination Function Messages EUROPEAN ORGANISATION FOR THE SAFETY OF AIR NAVIGATION E U R O C O N T R O L EUROCONTROL STANDARD DOCUMENT FOR SURVEILLANCE DATA EXCHANGE Part 5 : Category 017 Mode S Surveillance Coordination Function

More information

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives

More information

INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE

INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE Antonius B. Wijanarto Head of Center for Geodetic Control Network and Geodynamics GEOSPATIAL INFORMATION AGENCY srgi@big.go.id ONE GEO.REFERENCE (One Map Policy)

More information

Advanced WiFi Attacks Using Commodity Hardware

Advanced WiFi Attacks Using Commodity Hardware Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

ARINC Project Initiation/Modification (APIM)

ARINC Project Initiation/Modification (APIM) Project Initiation/Modification proposal for the AEEC Proposed: October 11, 2016 ARINC Project Initiation/Modification (APIM) 1.0 Name of Proposed Project APIM 17-001 Internet Protocol version 6 (IPv6)

More information

Sixth Meeting of CNS/MET Sub-Group of APANPIRG

Sixth Meeting of CNS/MET Sub-Group of APANPIRG CNS/MET/SG/6-IP/32 International Civil Aviation Organization Sixth Meeting of CNS/MET Sub-Group of APANPIRG Bangkok, Thailand, 15-19 July 2002 Agenda Item 3: ATN transition planning TECHNICAL DOCUMENT

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

REPORT ON AGENDA ITEM 4

REPORT ON AGENDA ITEM 4 15/2/00 AERONAUTICAL TELECOMMUNICATION NETWORK PANEL (ATNP) THIRD MEETING Montreal, 7 to 18 February 2000 Agenda Item 4: Review of existing technical and procedural provisions relating to the aeronautical

More information

A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed

A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed Michael Rosenstein / Frank Corvese Michael Rosenstein michael.rosenstein@securedecisions.com 631.759.3910

More information

EUROMED GNSS II/MEDUSA project

EUROMED GNSS II/MEDUSA project EUROMED GNSS II/MEDUSA project PBN Implementation Workshop / Go Team PBN Implementation Workshop / Go Team, Tunis, February 2014 1 Contents Euromed GNSS European GNSS (E GNSS), EGNOS and Galileo Euromed

More information

Title: Planning AWS Platform Security Assessment?

Title: Planning AWS Platform Security Assessment? Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning

More information

ORCA OPTICAL AND RADIO-FREQUENCY

ORCA OPTICAL AND RADIO-FREQUENCY 1 Lyssandre Rammos Co-Founder & Head of Aviation Certification ORCA OPTICAL AND RADIO-FREQUENCY CONSTELLATIONS PROPRIETARY MATERIAL BELONGING ON TO ESA AIRCRAFT AND SKYFLOX B.V. SYSTEM SERVICE ARCHITECTURE

More information

COMPLEX SYSTEMS ONE SOLUTION

COMPLEX SYSTEMS ONE SOLUTION Communications Products, Inc. United States Coast Guard Avaya IP Office Training DAY 4 LESSONS 11, 12 & 13 COMPLEX SYSTEMS ONE SOLUTION Lesson 11 Voice Mail Lesson Objective: To become familiar with IPO

More information

Chapter 13 Location Privacy

Chapter 13 Location Privacy Chapter 13 Location Privacy Security aspects of mobile communication Implicit addressing Pseudonyms Communication mixes [NetSec], WS 2007/2008 13.1 Security Aspects of Mobile Communication Mobile communication

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

WiMAX Security: Problems & Solutions

WiMAX Security: Problems & Solutions (JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a

More information

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Talk Overview Security has been one of the great detractors for wireless technologies (and

More information

Regional telecommunication Networks for Integrated Telecommunications for Air Navigation Services

Regional telecommunication Networks for Integrated Telecommunications for Air Navigation Services Regional telecommunication Networks for Integrated Telecommunications for Air Navigation Services Automation System and Integrated Telecommunications for Air Navigation Services/System-Wide Information

More information

CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET?

CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET? CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET? Peter Armstrong, Hong Kong March 2015 GROWING FROM STRENGTH TO STRENGTH... WHY IT MATTERS IT IS A REAL PROBLEM AND IT IS PERVASIVE GOVERNMENTS

More information

Helping our customers master every decisive moment

Helping our customers master every decisive moment Helping our customers master every decisive moment Thales Group overview www.thalesgroup.com MORE THAN Overview 65,000 employees 60 Countries. Global presence 797 million Self-funded R&D* 2017 * Does not

More information

Exposing vulnerabilities in electric power grids: An experimental approach

Exposing vulnerabilities in electric power grids: An experimental approach Exposing vulnerabilities in electric power grids: An experimental approach International Journal of Critical Infrastructure Protection Luigi Coppolino, S. D Antonio, and L. Romano (Tropea, 24-26 Settembre

More information

LYNX MULTILINK SURVEILLANCE SYSTEM

LYNX MULTILINK SURVEILLANCE SYSTEM Lynx Brochure 2-18-15_MB-2005-10.qxd 2/20/2015 11:16 AM Page 1 LYNX MULTILINK SURVEILLANCE SYSTEM Aviation Products Lynx Brochure 2-18-15_MB-2005-10.qxd 2/20/2015 11:16 AM Page 2 LYNX NGT-9000 The Lynx

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

EUROCONTROL PEGASUS*Plus: A frame for GNSS Data Evaluation

EUROCONTROL PEGASUS*Plus: A frame for GNSS Data Evaluation PEGASUS*Plus: A frame for GNSS Data Evaluation David Duchet, Ivan Konaktchiev Carsten Butzmuehlen, Andreas Lipp Eurocontrol Experimental Centre Introduction As part of the approval process for operations

More information

PT Unified Application Security Enforcement. ptsecurity.com

PT Unified Application Security Enforcement. ptsecurity.com PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over

More information

thalesgroup.com NETWORK & INFRASTRUCTURE SYSTEMS NEXIUM SAT Your battlefield-proven partner Anytime, anywhere

thalesgroup.com NETWORK & INFRASTRUCTURE SYSTEMS NEXIUM SAT Your battlefield-proven partner Anytime, anywhere thalesgroup.com NETWORK & INFRASTRUCTURE SYSTEMS NEXIUM SAT Your battlefield-proven partner Anytime, anywhere Battlefield-Proven Satellite Commun In a fast changing world with daily emerging new threats,

More information

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor Network Access Control and VoIP Ben Hostetler Senior Information Security Advisor Objectives/Discussion Points Network Access Control Terms & Definitions Certificate Based 802.1X MAC Authentication Bypass

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth«

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth« REPUBLIC OF ALBANIA ELECTRONIC AND POSTAL COMMUNICATIONS AUTHORITY - AKEP TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth« SUMMARY What is Smart Grid Communications Networks

More information

IMPLEMENTATION ISSUES, CHALLENGES, LESSONS LEARNED FOR DATA LINK MONITORING

IMPLEMENTATION ISSUES, CHALLENGES, LESSONS LEARNED FOR DATA LINK MONITORING IMPLEMENTATION ISSUES, CHALLENGES, LESSONS LEARNED FOR DATA LINK MONITORING OPERATIONAL DATA LINK WORKSHOP 8-12 August Accra Josiah BACKOBI Regional Manager Safety & Flight Operations Operational Data

More information