Lightweight Location Verification in Air Traffic Surveillance Networks
暂无分享,去创建一个
Ivan Martinovic | Martin Strohmeier | Vincent Lenders | I. Martinovic | Martin Strohmeier | Vincent Lenders
[1] Radha Poovendran,et al. A Framework for Securing Future e-Enabled Aircraft Navigation and Surveillance , 2009 .
[2] Gérard Lachapelle,et al. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .
[3] Ivan Martinovic,et al. Security of ADS-B: State of the Art and Beyond , 2013, ArXiv.
[4] Chan-TinEric,et al. The Frog-Boiling Attack , 2011 .
[5] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[6] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[7] Yongdae Kim,et al. The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems , 2011, TSEC.
[8] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[9] Bashar Nuseibeh,et al. Securing the Skies: In Requirements We Trust , 2009, Computer.
[10] Brandon Kovell,et al. Comparative Analysis of ADS-B Verification Techniques , 2012 .
[11] Loukas Lazos,et al. Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.
[12] Todd E. Humphreys,et al. Can Cryptography Secure Next Generation Air Traffic Surveillance? , 2014 .
[13] Radha Poovendran,et al. Security and privacy of future aircraft wireless communications with offboard systems , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[14] Robert F. Mills,et al. Security analysis of the ADS-B implementation in the next generation air transportation system , 2011, Int. J. Crit. Infrastructure Prot..
[15] Jing Liu,et al. Survey of Wireless Indoor Positioning Techniques and Systems , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[16] Ivan Martinovic,et al. Bringing up OpenSky: A large-scale ADS-B sensor network for research , 2014, IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.
[17] Nathan J. Gomes,et al. Next Generation Wireless Communications Using Radio over Fiber , 2012 .
[18] Fazli Subhan,et al. Combined K-Nearest Neighbors and Fuzzy Logic Indoor Localization Technique for Wireless Sensor Network , 2012 .
[19] Andrei Costin,et al. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices , 2012 .
[20] Adrie Stander,et al. Cyber security in civil aviation , 2016 .
[21] Ivan Martinovic,et al. Realities and challenges of nextgen air traffic management: the case of ADS-B , 2014, IEEE Communications Magazine.
[22] Ivan Martinovic,et al. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.
[23] Eric Feron,et al. Graceful Degradation of Air Traffic Operations: Airspace Sensitivity to Degraded Surveillance Systems , 2008, Proceedings of the IEEE.
[24] Srdjan Capkun,et al. Short paper: detection of GPS spoofing attacks in power grids , 2014, WiSec '14.
[25] Wint Yi Poe. Design Problems in large-scale, time-sensitive WSNs , 2012 .
[26] Gaspare Galati,et al. Localization algorithms for multilateration (MLAT) systems in airport surface surveillance , 2015, Signal Image Video Process..
[27] M. Sparkes. Securing the skies , 2006 .
[28] Ivan Martinovic,et al. Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.
[29] G. Galati,et al. Wide area surveillance using SSR mode S multilateration: advantages and limitations , 2005, European Radar Conference, 2005. EURAD 2005..
[30] Robert F. Mills,et al. Enhancing the security of aircraft surveillance in the next generation air traffic control system , 2013, Int. J. Crit. Infrastructure Prot..
[31] M. Mosavi,et al. Applying Neural Network Ensembles for Clustering of GPS Satellites , 2011 .
[32] Hussein A. Abbass,et al. Identification of ADS-B System Vulnerabilities and Threats , 2010 .
[33] Steffen Loth,et al. Airport Service Vehicle Scheduling , 2010 .
[34] W. Li,et al. Integrated aviation security for defense-in-depth of next generation air transportation system , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[35] A. Smith,et al. Methods to Provide System-Wide ADS-B Back-Up, Validation and Security , 2006, 2006 ieee/aiaa 25TH Digital Avionics Systems Conference.