1.

Record Nr.

UNINA9911006719903321

Autore

Song Houbing

Titolo

Aviation Cybersecurity : Foundations, Principles, and Applications

Pubbl/distr/stampa

Stevenage : , : Institution of Engineering & Technology, , 2022

©2022

ISBN

1-83724-609-2

1-5231-4236-7

1-83953-322-6

Edizione

[1st ed.]

Descrizione fisica

1 online resource (328 pages)

Collana

Radar, Sonar and Navigation

Altri autori (Persone)

HopkinsonKenneth

De ColaTomaso

AlexandrovichTom

LiuDahai

Disciplina

363.124

Soggetti

Aeronautics - Security measures

Aeronautics - Safety measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Contents -- About the editors -- Preface -- 1. Counter unmanned aerial vehicle for aviation security | Chengtao Xu, Yongxin Liu, JianWang, and Houbing Song -- 1.1 Introduction -- 1.2 Background -- 1.3 UAS detection -- 1.4 Radar-based UAS detection -- 1.5 Data-fusion-based UAS detection -- 1.6 UAS mitigation -- 1.7 Conclusion and remarks -- References -- 2. Formal verification of safety-critical software using SPARK | Laura Humphrey, Ryan Baity, and Kenneth Hopkinson -- 2.1 Introduction -- 2.2 Background on SPARK -- 2.3 An example of SPARK for cybersecurity -- 2.4 Aerospace and cybersecurity projects utilizing SPARK -- 2.5 Summary -- Acknowledgements -- References -- 3. Drone surveillance system-RF/WiFi-based drone detection, localization, and tracking: a survey | Igor Bisio, Chiara Garibotto, Halar Haleem, Fabio Lavagetto, and Andrea Sciarrone -- 3.1 Introduction -- 3.2 Drone surveillance system and RF/WiFi approach -- 3.3 Drone detection system -- 3.4 Drone localization system -- 3.5 Drone-tracking system -- 3.6 Research trends and challenges -- 3.7 Summary -- References -- 4.



Cybersecurity for the L-band Digital Aeronautical Communications System (LDACS) | Nils Mäurer, Thomas Gräupl, and Corinna Schmitt -- 4.1 Introduction -- 4.2 Background on LDACS -- 4.3 Security requirements, objectives and functions -- 4.4 A comprehensive cybersecurity architecture for LDACS -- 4.5 Evaluation of the LDACS cybersecurity architecture -- 4.6 Conclusion -- References -- 5. Using terrestrial ranging to monitor GNSS for targeted RF interference | Okuary Osechas, Omar García Crespillo1, and Michael Meurer -- 5.1 Background -- 5.2 Fault mechanism -- 5.3 Fault monitoring -- 5.4 Fault-free operation -- 5.5 Faulted operation -- 5.6 Discussion -- 5.7 Conclusion -- References.

6. Security risk assessments and countermeasures for future aeronautical communication network architecture | Muhammad Ali, Yim-Fun Hu, Rameez Asif, and Jiang-Ping Li -- 6.1 Introduction -- 6.2 Security for data link communications in aviation -- 6.3 Target avionics network architecture -- 6.4 Security risk assessment and treatment -- 6.5 Target network security risk assessment using CESG IAS -- 6.6 Define and assess threat sources -- 6.7 Define focus of interest (FoI) -- 6.8 Define threat actors -- 6.9 Identify estimate and priorities risks -- 6.10 Apply baseline countermeasure controls -- 6.11 Risk treatment -- 6.12 Conclusion -- References -- 7. Physical layer security in wireless HetNets avionics and satellite communication systems | Rameez Asif, Muhammad Ali, Yim-Fun Hu, and George Oguntala -- 7.1 Introduction -- 7.2 Attacks, attackers and impact -- 7.3 Fundamental security requirements of aeronautical communications -- 7.4 Security mechanisms -- 7.5 Physical layer security -- 7.6 Secrecy performance metrics -- 7.7 Physical layer security techniques -- 7.8 Physical layer - attack and countermeasures -- 7.9 Conclusion -- References -- 8. Cybersecurity and privacy issues | Dennis A. Vincenzi, Yupeng Yang, and Dahai Liu -- 8.1 Introduction -- 8.2 Privacy law -- 8.3 Privacy and cybersecurity privacy case law -- 8.4 Cybersecurity-related application -- 8.5 Discussion -- 8.6 Conclusion -- References -- 9. Workforce training and development in cybersecurity | Jiahao Yu, Sang-A Lee, and Dahai Liu -- 9.1 Introduction -- 9.2 Cybersecurity workforce training -- 9.3 Common training approaches -- 9.4 Summary -- References -- 10. Aviation cybersecurity: a cyber-physical systems perspective | Faisal Alrefaei, Abdullah Alzahrani, Houbing Song, and Mohamed Zohdy -- 10.1 Introduction -- 10.2 Importance of security in ACPSs -- 10.3 ACPS architecture.

10.4 Cyberattack on the ACPSs -- 10.5 Threats in the ACPS -- 10.6 Security of wireless sensor networks in aviation -- 10.7 Conclusion -- References -- Index.

Sommario/riassunto

The interdisciplinary nature of aviation cybersecurity and its wide-ranging impact requires contributions of expertise from multiple disciplines to collaborate in identifying ways forward. This book provides an understanding of the key technical, social and legal issues in aviation cybersecurity, and proposes innovative solutions.