Vai al contenuto principale della pagina

Aviation Cybersecurity : Foundations, Principles, and Applications



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Song Houbing Visualizza persona
Titolo: Aviation Cybersecurity : Foundations, Principles, and Applications Visualizza cluster
Pubblicazione: Stevenage : , : Institution of Engineering & Technology, , 2022
©2022
Edizione: 1st ed.
Descrizione fisica: 1 online resource (328 pages)
Disciplina: 363.124
Soggetto topico: Aeronautics - Security measures
Aeronautics - Safety measures
Altri autori: HopkinsonKenneth  
De ColaTomaso  
AlexandrovichTom  
LiuDahai  
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Contents -- About the editors -- Preface -- 1. Counter unmanned aerial vehicle for aviation security | Chengtao Xu, Yongxin Liu, JianWang, and Houbing Song -- 1.1 Introduction -- 1.2 Background -- 1.3 UAS detection -- 1.4 Radar-based UAS detection -- 1.5 Data-fusion-based UAS detection -- 1.6 UAS mitigation -- 1.7 Conclusion and remarks -- References -- 2. Formal verification of safety-critical software using SPARK | Laura Humphrey, Ryan Baity, and Kenneth Hopkinson -- 2.1 Introduction -- 2.2 Background on SPARK -- 2.3 An example of SPARK for cybersecurity -- 2.4 Aerospace and cybersecurity projects utilizing SPARK -- 2.5 Summary -- Acknowledgements -- References -- 3. Drone surveillance system-RF/WiFi-based drone detection, localization, and tracking: a survey | Igor Bisio, Chiara Garibotto, Halar Haleem, Fabio Lavagetto, and Andrea Sciarrone -- 3.1 Introduction -- 3.2 Drone surveillance system and RF/WiFi approach -- 3.3 Drone detection system -- 3.4 Drone localization system -- 3.5 Drone-tracking system -- 3.6 Research trends and challenges -- 3.7 Summary -- References -- 4. Cybersecurity for the L-band Digital Aeronautical Communications System (LDACS) | Nils Mäurer, Thomas Gräupl, and Corinna Schmitt -- 4.1 Introduction -- 4.2 Background on LDACS -- 4.3 Security requirements, objectives and functions -- 4.4 A comprehensive cybersecurity architecture for LDACS -- 4.5 Evaluation of the LDACS cybersecurity architecture -- 4.6 Conclusion -- References -- 5. Using terrestrial ranging to monitor GNSS for targeted RF interference | Okuary Osechas, Omar García Crespillo1, and Michael Meurer -- 5.1 Background -- 5.2 Fault mechanism -- 5.3 Fault monitoring -- 5.4 Fault-free operation -- 5.5 Faulted operation -- 5.6 Discussion -- 5.7 Conclusion -- References.
6. Security risk assessments and countermeasures for future aeronautical communication network architecture | Muhammad Ali, Yim-Fun Hu, Rameez Asif, and Jiang-Ping Li -- 6.1 Introduction -- 6.2 Security for data link communications in aviation -- 6.3 Target avionics network architecture -- 6.4 Security risk assessment and treatment -- 6.5 Target network security risk assessment using CESG IAS -- 6.6 Define and assess threat sources -- 6.7 Define focus of interest (FoI) -- 6.8 Define threat actors -- 6.9 Identify estimate and priorities risks -- 6.10 Apply baseline countermeasure controls -- 6.11 Risk treatment -- 6.12 Conclusion -- References -- 7. Physical layer security in wireless HetNets avionics and satellite communication systems | Rameez Asif, Muhammad Ali, Yim-Fun Hu, and George Oguntala -- 7.1 Introduction -- 7.2 Attacks, attackers and impact -- 7.3 Fundamental security requirements of aeronautical communications -- 7.4 Security mechanisms -- 7.5 Physical layer security -- 7.6 Secrecy performance metrics -- 7.7 Physical layer security techniques -- 7.8 Physical layer - attack and countermeasures -- 7.9 Conclusion -- References -- 8. Cybersecurity and privacy issues | Dennis A. Vincenzi, Yupeng Yang, and Dahai Liu -- 8.1 Introduction -- 8.2 Privacy law -- 8.3 Privacy and cybersecurity privacy case law -- 8.4 Cybersecurity-related application -- 8.5 Discussion -- 8.6 Conclusion -- References -- 9. Workforce training and development in cybersecurity | Jiahao Yu, Sang-A Lee, and Dahai Liu -- 9.1 Introduction -- 9.2 Cybersecurity workforce training -- 9.3 Common training approaches -- 9.4 Summary -- References -- 10. Aviation cybersecurity: a cyber-physical systems perspective | Faisal Alrefaei, Abdullah Alzahrani, Houbing Song, and Mohamed Zohdy -- 10.1 Introduction -- 10.2 Importance of security in ACPSs -- 10.3 ACPS architecture.
10.4 Cyberattack on the ACPSs -- 10.5 Threats in the ACPS -- 10.6 Security of wireless sensor networks in aviation -- 10.7 Conclusion -- References -- Index.
Sommario/riassunto: The interdisciplinary nature of aviation cybersecurity and its wide-ranging impact requires contributions of expertise from multiple disciplines to collaborate in identifying ways forward. This book provides an understanding of the key technical, social and legal issues in aviation cybersecurity, and proposes innovative solutions.
Titolo autorizzato: Aviation Cybersecurity  Visualizza cluster
ISBN: 1-83724-609-2
1-5231-4236-7
1-83953-322-6
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9911006719903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Radar, Sonar and Navigation