Assessing aircraft security: A comprehensive survey and methodology for evaluation

E Habler, R Bitton, A Shabtai - ACM Computing Surveys, 2023 - dl.acm.org
The sophistication and complexity of cyber attacks and the variety of targeted platforms have
grown in recent years. Adversaries are targeting a wide range of platforms, eg, enterprise …

Studying cybersecurity in civil aviation, including develo** and applying aviation cybersecurity risk assessment

AA Elmarady, K Rahouma - IEEE access, 2021 - ieeexplore.ieee.org
In addition to the importance of safety in civil aviation, the significance of cybersecurity in the
aviation sector cannot be ignored, and this fact has often been highlighted owing to frequent …

All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems

KC Zeng, S Liu, Y Shu, D Wang, H Li, Y Dou… - 27th USENIX security …, 2018 - usenix.org
Mobile navigation services are used by billions of users around globe today. While GPS
spoofing is a known threat, it is not yet clear if spoofing attacks can truly manipulate road …

Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks

K Jansen, M Schäfer, D Moser… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The aviation industry's increasing reliance on GPS to facilitate navigation and air traffic
monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with …

Characterizing trust and resilience in distributed consensus for cyberphysical systems

M Yemini, A Nedić, AJ Goldsmith… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work considers the problem of resilient consensus, where stochastic values of trust
between agents are available. Specifically, we derive a unified mathematical framework to …

[HTML][HTML] Air traffic security: Aircraft classification using ADS-B message's phase-pattern

M Leonardi, L Di Gregorio, D Di Fausto - Aerospace, 2017 - mdpi.com
Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance system used in Air
Traffic Control. With this system, the aircraft transmits their own information (identity, position …

Securing uav flying base station for mobile networking: A review

SY Chang, K Park, J Kim, J Kim - Future Internet, 2023 - mdpi.com
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …

Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures

KB Kelarestaghi, M Foruhandeh, K Heaslip… - arxiv preprint arxiv …, 2019 - arxiv.org
In this study, we attempt to add to the literature of Connected and Automated Vehicle (CAV)
security by incorporating the security vulnerabilities and countermeasures of the Vehicular …

How physicality enables trust: A new era of trust-centered cyberphysical systems

S Gil, M Yemini, A Chorti, A Nedić, HV Poor… - arxiv preprint arxiv …, 2023 - arxiv.org
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …

Spotr: GPS spoofing detection via device fingerprinting

M Foruhandeh, AZ Mohammed, G Kildow… - Proceedings of the 13th …, 2020 - dl.acm.org
As the world's predominant navigation system, GPS is critical to modern life, finding
applications in diverse areas like information security, healthcare, marketing, and power and …