Enrique Casado, Rosa Rodríguez, Pedro Taboso, Javier García
{"title":"未来空中交通管理系统中的信息安全","authors":"Enrique Casado, Rosa Rodríguez, Pedro Taboso, Javier García","doi":"10.2514/1.I010233","DOIUrl":null,"url":null,"abstract":"The detection, identification, and evaluation of vulnerable areas mark the cornerstone of the analysis that is required to improve the security of both current and future air traffic management systems. These three functions evolved from the use of new technologies in the communication, navigation, and surveillance infrastructure and in the new generation of aircraft. This analysis includes the identification of the assets, which are understood to be things of value or things to protect from potential threats. In the future context, an infrastructure for information sharing will be deployed to enable robust data exchange among air traffic management stakeholders. Information will become a major asset to be protected. This paper aims at presenting the future air traffic management environment by analyzing the impact of intended attacks on flight and surveillance information and how the effects are propagated throughout the whole system. For illustration purposes, some potential scenarios are described in o...","PeriodicalId":179117,"journal":{"name":"J. Aerosp. Inf. Syst.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Information Security in Future Air Traffic Management Systems\",\"authors\":\"Enrique Casado, Rosa Rodríguez, Pedro Taboso, Javier García\",\"doi\":\"10.2514/1.I010233\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The detection, identification, and evaluation of vulnerable areas mark the cornerstone of the analysis that is required to improve the security of both current and future air traffic management systems. These three functions evolved from the use of new technologies in the communication, navigation, and surveillance infrastructure and in the new generation of aircraft. This analysis includes the identification of the assets, which are understood to be things of value or things to protect from potential threats. In the future context, an infrastructure for information sharing will be deployed to enable robust data exchange among air traffic management stakeholders. Information will become a major asset to be protected. This paper aims at presenting the future air traffic management environment by analyzing the impact of intended attacks on flight and surveillance information and how the effects are propagated throughout the whole system. For illustration purposes, some potential scenarios are described in o...\",\"PeriodicalId\":179117,\"journal\":{\"name\":\"J. Aerosp. Inf. Syst.\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Aerosp. Inf. Syst.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2514/1.I010233\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Aerosp. Inf. Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2514/1.I010233","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Security in Future Air Traffic Management Systems
The detection, identification, and evaluation of vulnerable areas mark the cornerstone of the analysis that is required to improve the security of both current and future air traffic management systems. These three functions evolved from the use of new technologies in the communication, navigation, and surveillance infrastructure and in the new generation of aircraft. This analysis includes the identification of the assets, which are understood to be things of value or things to protect from potential threats. In the future context, an infrastructure for information sharing will be deployed to enable robust data exchange among air traffic management stakeholders. Information will become a major asset to be protected. This paper aims at presenting the future air traffic management environment by analyzing the impact of intended attacks on flight and surveillance information and how the effects are propagated throughout the whole system. For illustration purposes, some potential scenarios are described in o...