A Survey on Security of Automatic Dependent Surveillance-Broadcast (ADS-B) Protocol: Challenges, Potential Solutions and Future Directions

HA Khan, H Khan, S Ghafoor… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
This work delves into critical examination of the broadcast data safety of Automatic
Dependent Surveillance-Broadcast (ADS-B) system, an essential protocol for aircraft …

Bluetooth Low-Energy Beacon Resistance to Jamming Attack

V Sokolov, P Skladannyi… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
To assess the potential damage from jamming attacks on a Bluetooth Low-Energy (BLE)
Beacon device, an experimental setup with a packet emitter, sniffer, and signal spectrum …

A survey on security and privacy of automatic dependent surveillance-broadcast (ads-b) protocol: Challenges, potential solutions and future directions

H Ahmed, H Khan, MA Khan - Authorea Preprints, 2023 - techrxiv.org
Automatic Dependent Surveillance–Broadcast (ADS-B) system is based on wireless
communications protocol to broadcast aircraft identification and navigational information via …

ZigBee Network Resistance to Jamming Attacks

V Sokolov, P Skladannyi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The growth in the number of wireless devices, particularly in the context of the Internet of
Things, has significant implications for their security. While wireless technologies enable …

[PDF][PDF] Model of Information Technology for Efficient Data Processing in Cloud-based Malware Detection Systems of Critical Information Infrastructure (short paper).

S Gnatyuk, F Satybaldiyeva, V Sydorenko… - CPITS, 2023 - ceur-ws.org
The rapid development of ICT caused significant changes in the ways and means of
communication between people using network technologies. Creating, storing, distributing …

Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel

O Mykhaylova, A Stefankiv… - … in Information and …, 2024 - elibrary.kubg.edu.ua
This study focuses on the analysis of replay attacks, which pose a significant risk to remote
control systems using the 433 MHz radio frequency band. A replay attack occurs when an …

[PDF][PDF] Security as Code Concept for Fulfilling ISO/IEC 27001: 2022 Requirements.

O Vakhula, Y Kurii, I Opirskyy, V Susukailo - CPITS, 2024 - ceur-ws.org
This article thoroughly examines and analyzes the latest iteration of the ISO/IEC 27001:
2022 standard, outlining the most contemporary requirements for information security …

[PDF][PDF] Comprehensive Approach for Developing an Enterprise Cloud Infrastructure.

V Khoma, A Abibulaiev, A Piskozub, T Kret - CPITS, 2024 - ceur-ws.org
The modern world is witnessing an incredibly rapid adoption of cloud technologies across
various sectors, making security in cloud environments extremely relevant. The problem lies …

[PDF][PDF] Failure Risk Prediction While Processing Defining Parameters of Telecommunication and Radio-Electronic Systems

O Solomentsev, M Zaliskyi, O Zuiev, A Osipchuk - simulation, 2023 - ceur-ws.org
Effective operation of telecommunications and radio-electronic systems depends on several
factors that must be taken into account at all stages of the equipment lifecycle. While using …

[PDF][PDF] Impact of Internet Fragmentation on the Unity, Security, and Stability of Global Internet

VS andMaksim Iavich - 2024 - researchgate.net
The deepening process of fragmentation has become a new challenge for the unity, security,
and stable development of the global Internet. That is, it can be said that the Internet is in …