Vulnerabilities and mitigation methods in the NextGen air traffic control system

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The air traffic control (ATC) systems have been modernizing and standardizing the automation platforms in recent years in order to control increased number of flights. In 2004, FAA started transforming the nation’s ground-based ATC system to a system which uses satellite-based navigation and other advanced technology, called NextGen. The NextGen system deploys Internet Protocol based network to communicate and heavily relies on computerized information system and digital data, which may introduce new vulnerabilities for exploitations. Many vulnerabilities of NextGen stem from the increased interconnection of systems through wireless networks. For instance, a critical part of the NextGen, Automatic Dependent Surveillance – Broadcast, which transfers essential information via wireless network without encryption, is an easy target for attackers. There have been some deployments of security measures but still lack in critical system. In this study, we present the potential vulnerabilities of the NextGen ATC systems and their possible solutions.

Cite

CITATION STYLE

APA

Sueki, S., & Kim, Y. (2016). Vulnerabilities and mitigation methods in the NextGen air traffic control system. In Advances in Intelligent Systems and Computing (Vol. 448, pp. 201–211). Springer Verlag. https://doi.org/10.1007/978-3-319-32467-8_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free