The Approach of ACARS Data Encryption and Authentication
With the increasing number of aircraft, the airlines and civil aviation organization are relying on ACARS (Aircraft Communications Addressing and Report System) for air traffic and control. Unfortunately, automated information exchange between aircraft and ground entity also increase the system vuln...
Saved in:
| Published in | 2010 International Conference on Computational Intelligence and Security pp. 556 - 560 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.12.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424491148 1424491142 |
| DOI | 10.1109/CIS.2010.127 |
Cover
| Abstract | With the increasing number of aircraft, the airlines and civil aviation organization are relying on ACARS (Aircraft Communications Addressing and Report System) for air traffic and control. Unfortunately, automated information exchange between aircraft and ground entity also increase the system vulnerability and may severely impacts the safety of a flight. This paper introduce a End-to-End architecture which employ message encryption and authentication to protect the security between aircraft and airlines and thus permit ACARS data link messages to be exchanged in a secure manner. |
|---|---|
| AbstractList | With the increasing number of aircraft, the airlines and civil aviation organization are relying on ACARS (Aircraft Communications Addressing and Report System) for air traffic and control. Unfortunately, automated information exchange between aircraft and ground entity also increase the system vulnerability and may severely impacts the safety of a flight. This paper introduce a End-to-End architecture which employ message encryption and authentication to protect the security between aircraft and airlines and thus permit ACARS data link messages to be exchanged in a secure manner. |
| Author | Xiaofeng Wu Meng Yue |
| Author_xml | – sequence: 1 surname: Meng Yue fullname: Meng Yue email: myue_23@163.com organization: Tianjin Key Lab. for Adv. Signal Process., Civil Aviation Univ. of China, Tianjin, China – sequence: 2 surname: Xiaofeng Wu fullname: Xiaofeng Wu email: beifang162@126.com organization: Tianjin Key Lab. for Adv. Signal Process., Civil Aviation Univ. of China, Tianjin, China |
| BookMark | eNotjj1PwzAURY0ACSjZ2Fj8B1L8_PFsj1FooVIlJJq9cpIXJQicKAlD_z0pcJerc4are8euYh-JsQcQawDhn_LdYS3FmaS9YIm3Tlj0Rktv1eUvg5ZaewDtblgyTR9iiZHWItwyV7TEs2EY-1C1vG94lmfvB_4c5sA3sRpPw9z1kYdY8-x7binOXRXO6p5dN-FzouS_V6zYbor8Nd2_vezybJ92XsxpUyKRcrWurKhBmZIC-kZaTTWgBAJLfjFCS6ktmrLB5TU5dIszhEqt2OPfbEdEx2HsvsJ4Ohr0qLRSP1BTRsU |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CIS.2010.127 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9780769542973 0769542972 |
| EndPage | 560 |
| ExternalDocumentID | 5696343 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-fb6ee38d4c70d135bea69f274ed1621e17e9a6904224765bf6973e8686905e633 |
| IEDL.DBID | RIE |
| ISBN | 9781424491148 1424491142 |
| IngestDate | Wed Aug 27 03:21:55 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-fb6ee38d4c70d135bea69f274ed1621e17e9a6904224765bf6973e8686905e633 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5696343 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-Dec. |
| PublicationDateYYYYMMDD | 2010-12-01 |
| PublicationDate_xml | – month: 12 year: 2010 text: 2010-Dec. |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 International Conference on Computational Intelligence and Security |
| PublicationTitleAbbrev | cis |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000527761 ssib015832302 |
| Score | 1.4784323 |
| Snippet | With the increasing number of aircraft, the airlines and civil aviation organization are relying on ACARS (Aircraft Communications Addressing and Report... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 556 |
| SubjectTerms | ACARS Air traffic control Aircraft data encryption Encoding Encryption Message authentication security |
| Title | The Approach of ACARS Data Encryption and Authentication |
| URI | https://ieeexplore.ieee.org/document/5696343 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF7anjyptOKbPXg0bZJN9nGU2lKFitgKvZXd7ARESKWkh_rrnd08FPHgLZtD2GFmM5nJN99HyE2YsSiGPMQix7IATyILMM-IIElCsCC10p7UZ_7EZ6_J4ypddchtOwsDAB58BkN36f_l2022c62yUcoxXBLWJV0heTWr1cROlGJoNlRWFa93LLBEb2a5lJsZbSie6rVsgfBqNH5YVDgvry_zQ2jF55npIZk3O6zgJe_DXWmG2ecv8sb_mnBEBt8TffS5zVXHpANFn0iMEXpXk4rTTU7RLy8Leq9LTSdFtt371wnVhaWuk-ZwRVWDb0CW08lyPAtqJYXgTYVlkBsOwKRNMhHaiKUGNFc51qNgIx5HEAlAnyhHB5YInpqcK8FAcqdWlQJn7IT0ik0Bp4Q6TU8wQjDHK4e5TOe5DI00Eh-Z4afKGek7o9cfFVfGurb3_O_bF-QgbuEhl6RXbndwhUm-NNfeu1_hIZ5l |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qPehJpRXf7sGjaZPsM0epLa22RWyF3ko2mYAIqZTkoL_e3bwU8eAtm0PYYWYzmck33wdw40bU8zFxTZETU8ecROqYPCMdxlyMUYVBWJD6zOZi_MIeVnzVgttmFgYRC_AZ9uxl8S8_3kS5bZX1uTDhwugO7HLGGC-ntero8bgJzprMqmT29qUp0utprsBOjdYkT9VaNVD4oD-YLEqkV6Ew80Nqpcg0owOY1XssASZvvTzTvejzF33jf404hO73TB95arLVEbQw7YAyUULuKlpxskmI8czzgtyHWUiGabT9KF4oJExjYntpFllUtvi6sBwNl4OxU2kpOK-BmzmJFohUxSySbuxRrjEUQWIqUow94XvoSTReCSwhGJOC60QEkqISVq-Ko6D0GNrpJsUTIFbVE7WU1DLLmWwWJolytdLKPDIyHyun0LFGr99Ltox1Ze_Z37evYW-8nE3X08n88Rz2_QYscgHtbJvjpUn5mb4qPP0FaBGhsg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Computational+Intelligence+and+Security&rft.atitle=The+Approach+of+ACARS+Data+Encryption+and+Authentication&rft.au=Meng+Yue&rft.au=Xiaofeng+Wu&rft.date=2010-12-01&rft.pub=IEEE&rft.isbn=9781424491148&rft.spage=556&rft.epage=560&rft_id=info:doi/10.1109%2FCIS.2010.127&rft.externalDocID=5696343 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424491148/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424491148/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424491148/sc.gif&client=summon&freeimage=true |