Conference item
Intrusion detection for airborne communication using PHY-layer information
- Abstract:
- With passenger and cargo traffic growing rapidly worldwide, and unmanned aerial vehicles (UAV) poised to enter commercial airspaces, a secure next generation of air traffic management systems is required. Recent articles in the academic and hacker community highlight crucial security challenges faced by integral parts of these next generation protocols, with the most dangerous attacks based on classic message injection. In this article, we analyze the possibility and effectiveness of detecting such attacks on critical air traffic infrastructures with a single receiver based on physical layer information. Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 2.2MB, Terms of use)
-
- Publisher copy:
- 10.1007/978-3-319-20550-2_4
- Publisher:
- Springer, Cham
- Host title:
- DIMVA 2015: Detection of Intrusions and Malware, and Vulnerability Assessment
- Journal:
- DIMVA 2015: Detection of Intrusions and Malware, and Vulnerability Assessment More from this journal
- Pages:
- 67-77
- Series:
- Lecture Notes in Computer Science
- Publication date:
- 2015-06-23
- DOI:
- ISSN:
-
1611-3349 and 0302-9743
- ISBN:
- 9783319205496
- Keywords:
- Pubs id:
-
pubs:576197
- UUID:
-
uuid:938dc003-5cbb-499a-9d02-21163fb9a31c
- Local pid:
-
pubs:576197
- Deposit date:
-
2016-10-12
Terms of use
- Copyright holder:
- Springer International Publishing Switzerland
- Copyright date:
- 2015
- Notes:
-
This is an
accepted manuscript of a conference proceeding published by Springer in DIMVA 2015: Detection of Intrusions and Malware, and Vulnerability Assessment on 2015-06-23, available online: http://dx.doi.org/10.1007/978-3-319-20550-2_4
If you are the owner of this record, you can report an update to it here: Report update to this record