TY - JOUR T1 - Air Traffic Security against Cyber Threats AU - Efe, Ahmet AU - Tuzlupınar, Büşra AU - Can Cavlan, Ahmet PY - 2019 DA - September Y2 - 2019 DO - 10.30516/bilgesci.405074 JF - Bilge International Journal of Science and Technology Research JO - bilgesci PB - Kutbilge Akademisyenler Derneği WT - DergiPark SN - 2651-401X SP - 135 EP - 143 VL - 3 IS - 2 LA - en AB - AirTraffic Management (ATM) security is amongst major topics of safety criticalsystems and issues of both civil aviation and military defense units. Thedramatic increase in the number of the aircrafts and the innovative technologythat provides smaller and sustainable air vehicles make the air communicationprotocols and methods as a high profile potential target for black hat hackers.There are lots of communication protocols and different systems between air toground (A2G) station and air to air (A2A). These include set of informationsuch as aircraft communication data, voice information and flight planningwhich works on some protocols. All of radar detection and chasing systems arealso using similar techniques. The Data Distribution Service (DDS) is aprotocol for data transfer to each node. The communication systems can beprotected from third party system or hackers to some extent. The security iscoming from that point. Each components have own security using valid andstandard methods. Our approach in this study, enforces reasonable andapplicable security concepts and techniques for a robust and resillient airtraffic. KW - Information Security KW - DDS KW - ATM Security KW - ATC KW - ADS-B CR - [1] J. Hird, M. Hawley and C. Machin, ”Air Traffic Management Security Research in SESAR,” 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, 2016, pp. 486-492. CR - [2] P. Skaves, ”FAA Aircraft Systems Information Security Protection overview,” 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), Herdon, VA, 2015, pp. A1-1-A1-17. CR - [3] M. Rusko and M. Finke, ”Using speech analysis in voice communication: A new approach to improve air traffic management security,” 2016 7th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Wroclaw, 2016, pp. 000181-000186. CR - [4] M. Monteiro, T. Sarmento, A. Barreto, P. Costa and M. Hieb, ”An integrated mission and cyber simulation for Air Traffic Control,” 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, 2016, pp. 2687-2692. CR - [5] Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, Computers and Electrical Engineering, Volume 39, Issue 1, January 2013, Pages 34-46. CR - [6] S. Pradhan et al., ”Establishing Secure Interactions across Distributed Applications in Satellite Clusters,” 2014 IEEE International Conference on Space Mission Challenges for Information Technology, Laurel MD, 2014, pp. 67-74. CR - [7] Angelo Corsaro, ”The DDS Tutorial” http://download.prismtech.com/docs/Vortex/pdfs/OpenSplice_DDSTutorial.pdf CR - [8] CSFI volunteers, ”CSFI ATC (Air Traffic Control) Cyber security Project”,July 16, 2015, https://scadahacker.com/library/Documents/Case_Studies/CSFI%20-%20ATC%20Cyber%20Security%20Project.pdf CR - [9] Jon Gilbert, Scott Boden, Roger Atkinson, ”Aircraft data and voice communications system and method”, February 13, 2003. CR - [10]https://www.ead.eurocontrol.int/eadcms/eadsite/evolutions/aimsl.html CR - [11] https://arstechnica.com/tech-policy/2015/03/us-air-traffic-control-computer-system-vulnerable-to-terrorist-hackers/ CR - [12] http://www.gao.gov/assets/670/668169.pdf CR - [13] https://ecfsapi.fcc.gov/file/7021694523.pdf CR - [14] http://securityaffairs.co/wordpress/40975/hacking/easa-airplane-hacking.html CR - [15] http://securityaffairs.co/wordpress/13625/hacking/hijacking-planes-navigation-system-with-android-reality-or-unnecessary-alarm.html CR - [16] http://www.securityweek.com/fbi-says-researcher-admitted-hacking-airplane-mid-flight CR - [17] http://abcnews.go.com/US/story?id=95993&page=1 CR - [18] https://mods-n-hacks.gadgethacks.com/how-to/hack-transistor-radio-hear-air-traffic-control-232754/ CR - [19]https://www.npr.org/sections/alltechconsidered/2012/08/16/158758161/could-the-new-air-traffic-control-system-be-hacked CR - [20] https://www.airport-technology.com/features/featureair-traffic-control-easy-target-hackers/ CR - [21] https://www.theverge.com/2017/11/23/16694118/mr-robot-hack-report-s3e7-fredrick-tanya UR - https://doi.org/10.30516/bilgesci.405074 L1 - https://dergipark.org.tr/en/download/article-file/820391 ER -