liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Singh Gaba, Gurjot, Dr.
Biography [eng]

Gurjot Singh Gaba is a cyber security enthusiast with a primary research focus on developing lightweight authentication and intrusion detection protocols. For this purpose, he prefers to use robust cryptographic primitives and machine learning algorithms, such as zero-knowledge proofs, symmetric and asymmetric cryptography, homomorphic encryption, blockchain, federated learning, etc.

Gurjot has 10+ years of academic experience and has delivered lectures for 4000+ hours on 20+ theory and lab courses. Gurjot has supervised 29 undergraduate research projects and 20 dissertations. He has published more than 100 articles that have appeared across reputed national and international journals and conferences. To date, Gurjot has served as an Editor/Reviewer/TPC for 50+ international journals and conferences.

Gurjot has several granted patents based on the principle of developing simple technology solutions to complex problems in our daily lives. His research accomplishments have been widely covered in print and electronic media. For his continuous participation and contributions to research and academics, he has been awarded the outstanding researcher award four times in a row and the best teacher award from the HRD minister of India.

Gurjot has an objective to uplift society, hence he is actively volunteering with various NGOs wherein his primary responsibility is to distribute meals, educate unprivileged children, and arrange blood donors. Gurjot hails from Manchester of North India, Ludhiana, and is fond of traveling with family and friends.

Publications (10 of 14) Show all publications
Rosén, A., Singh Gaba, G. & Gurtov, A. (2025). A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations. In: 2025 IEEE Conference on Communications and Network Security (CNS): . Paper presented at IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025 (pp. 1-6). Avignon, France: IEEE
Open this publication in new window or tab >>A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations
2025 (English)In: 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France: IEEE, 2025, p. 1-6Conference paper, Published paper (Refereed)
Abstract [en]

Traditional perimeter-based security models, which implicitly trust internal networks, are vulnerable to modern cyber threats such as ransomware and credential misuse, allowing lateral movement and large-scale breaches. Zero Trust Architecture (ZTA) mitigates these risks by enforcing continuous authentication and least-privilege access for all devices. However, organizations face challenges in adopting ZTA without disrupting operations or incurring high costs, and existing research lacks actionable guidance. Through extensive literature analysis, semi-structured interviews with diverse organizational staff, and evaluation of Zero Trust maturity across seven pillars, this article proposes a practical, phased roadmap tailored to the needs of an organization. The approach prioritizes operational continuity and minimizes implementation barriers, enabling robust and sustainable cybersecurity.

Place, publisher, year, edition, pages
Avignon, France: IEEE, 2025
Keywords
Micro-Segmentation, Network Security, Operational Continuity, Phased Implementation, Zero Trust Architecture (ZTA)
National Category
Computer Systems
Identifiers
urn:nbn:se:liu:diva-219042 (URN)10.1109/CNS66487.2025.11194934 (DOI)9798331538569 (ISBN)9798331538576 (ISBN)
Conference
IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025
Available from: 2025-10-27 Created: 2025-10-27 Last updated: 2025-10-30
Singh Gaba, G., Sari, A., Butun, I., Singh, P., Gurtov, A. & Liyanage, M. (2025). A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions. IEEE Open Journal of the Communications Society, 6, 8865-8929
Open this publication in new window or tab >>A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions
Show others...
2025 (English)In: IEEE Open Journal of the Communications Society, E-ISSN 2644-125X, Vol. 6, p. 8865-8929Article, review/survey (Refereed) Published
Abstract [en]

Industry 4.0 and 5.0 offer a promising framework for connecting electro-mechanical systems to cyberspace, enabling real-time access, telecontrol, human-machine collaboration, and intelligent automation of industrial operations. While horizontal and vertical interoperability serve as critical enablers of this ecosystem, heterogeneity among entities and the lack of standardized governance in interoperability allow cybercriminals to exploit structural vulnerabilities. These weaknesses and unknown bugs provide avenues for cyber-attackers to breach systems, conduct espionage, sabotage assets, and extort organizations, threatening IT and OT infrastructures, finances, reputations, and even human lives. This survey paper discusses cybersecurity and privacy threats within the Industry 4.0 and 5.0 ecosystems, their potential impact on industrial processes and peripherals, and the security challenges associated with the transition from Industry 4.0 to 5.0. To identify research gaps and vulnerabilities, we examine the architecture and components of diverse industrial frameworks and establish functional mappings using IIRA and RAMI models. Following a comprehensive threat modeling approach, we present a layered taxonomy of cyber-threats, classified based on their nature, behavior, and execution characteristics. To assist network administrators and security professionals, we propose a threat prioritization framework based on likelihood, detectability, impact severity, and operational consequences. Furthermore, we outline perspective-based cybersecurity challenges that expose deficiencies in current protective measures. As countermeasures, we advocate for AI-driven, blockchain-enabled, edge-computing-based, and privacy-preserving security solutions to defend against threats and mitigate potential damages. We also elaborate on key standardization initiatives, nation-specific privacy regulations, and ongoing research efforts focused on safeguarding the security and privacy of Industry 4.0 and beyond. The paper concludes by summarizing key lessons learned, identifying unresolved research questions, and suggesting future directions for a secure and resilient Industry 5.0 paradigm.

Place, publisher, year, edition, pages
IEEE Communications Society, 2025
Keywords
Cybersecurity, cyber-physical systems (CPS), Industry 4.0, industrial Internet, privacy
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-219282 (URN)10.1109/ojcoms.2025.3616289 (DOI)001604873900001 ()2-s2.0-105018097890 (Scopus ID)
Funder
Academy of Finland, 318927ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications, A4The Swedish Foundation for International Cooperation in Research and Higher Education (STINT), IB2019-8185
Note

Funding Agencies|Swedish Foundation for International Cooperation in Research and Higher Education (STINT) through the Initiation Grants Program [IB2019-8185]; Science Foundation Ireland through the CONNECT Phase 2 [13/RC/2077_P2]; Academy of Finland through the 6Genesis Project [318927]; CENIIT Project [17.01]; European Cooperation in Science and Technology [10.13039/501100000921]; COST Action CA22104 - Behavioral Next Generation in Wireless Networks for Cyber Security (BEiNG-WISE); Excellence Center at Linkping-Lund in IT under Project A4

Available from: 2025-11-04 Created: 2025-11-04 Last updated: 2025-12-07
Martintoni, D., Senni, V., Singh Gaba, G. & Gurtov, A. (2025). On the Role of SecRAM Catalogues in ATM Cyber Risk Assessment and Improvement Opportunities. In: 2025 Integrated Communications, Navigation and Surveillance Conference (ICNS): . Paper presented at The 25th Integrated Communications, Navigation and Surveillance Conference (ICNS), EuroControl, Belgium, 08-10 April, 2025. Belgium: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>On the Role of SecRAM Catalogues in ATM Cyber Risk Assessment and Improvement Opportunities
2025 (English)In: 2025 Integrated Communications, Navigation and Surveillance Conference (ICNS), Belgium: Institute of Electrical and Electronics Engineers (IEEE) , 2025Conference paper, Published paper (Refereed)
Abstract [en]

Current Air Traffic Management (ATM) systems are undergoing significant evolution due to increased traffic volumes, the introduction of diverse airborne systems such as Unmanned Aerial Vehicles (UAVs), technological advancements, and the potential to optimize operations through data-driven approaches. These advancements offer benefits in terms of efficiency, safety, and sustainability, but they also expose the systems to heightened cybersecurity risks. This paper analyzes the Security Risk Assessment Methodology (SecRAM) proposed by SESAR, focusing specifically on its use of complementary catalogs of threats and vulnerabilities. By validating the SecRAM approach in a contemporary ATM scenario, this paper identifies gaps in the framework that could be addressed to better meet the security needs of a modern and complex ATM ecosystem. Finally, this work proposes a set of enhancements to the SecRAM catalogs that will enable security professionals to design and develop secure and resilient modern ATM environments.

Place, publisher, year, edition, pages
Belgium: Institute of Electrical and Electronics Engineers (IEEE), 2025
Series
Integrated Communications, Navigation and Surveillance Conference, ICNS, ISSN 2155-4943, E-ISSN 2155-4951
Keywords
ATM, FCI, risk-assessment, security, SecRAM
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-213530 (URN)10.1109/ICNS65417.2025.10976972 (DOI)001516425900133 ()2-s2.0-105005194320 (Scopus ID)9798331534738 (ISBN)9798331534745 (ISBN)
Conference
The 25th Integrated Communications, Navigation and Surveillance Conference (ICNS), EuroControl, Belgium, 08-10 April, 2025
Funder
EU, Horizon Europe, 101114635
Note

Funding Agencies|SESAR Joint Undertaking under the EU's Horizon Europe programme [101114635]

Available from: 2025-05-12 Created: 2025-05-12 Last updated: 2025-08-29Bibliographically approved
Boonsong, S., Hagl, M., Stelkens-Kobsch, T. H., Ruediger, T., Gurtov, A. & Singh Gaba, G. (2025). Validation Exercise: Strengthening Cybersecurity Awareness in Air Traffic Control through Simulation-Based Training. In: : . Paper presented at SESAR Innovation Days (SID). Belgium
Open this publication in new window or tab >>Validation Exercise: Strengthening Cybersecurity Awareness in Air Traffic Control through Simulation-Based Training
Show others...
2025 (English)Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

This exercise validated an enhanced Attack Simulator that strengthens ATCOs cybersecurity awareness and response to ADS-B threats through realistic, simulation-based training. The research assessed the Attack Simulator's effectiveness in improving ATCOs' cyberattack recognition/response and to evaluate behavioural and performance changes pre-and post-knowledge transfer.

Place, publisher, year, edition, pages
Belgium: , 2025
Keywords
Aviation, Cybersecurity
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-219562 (URN)10.13140/RG.2.2.20341.23524 (DOI)
Conference
SESAR Innovation Days (SID)
Available from: 2025-11-18 Created: 2025-11-18 Last updated: 2025-11-18
Khan, S., Wang, Y., Singh Gaba, G., Gurtov, A. & Kumar, P. (2024). A Secure Framework For Controller Pilot Data Link Communications in Aviation Network. In: 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC): . Paper presented at AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), 29 Sept-3 Oct 2024, San Diego, CA, USA. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Secure Framework For Controller Pilot Data Link Communications in Aviation Network
Show others...
2024 (English)In: 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), Institute of Electrical and Electronics Engineers (IEEE), 2024Conference paper, Published paper (Refereed)
Abstract [en]

Controller Pilot Data Link Communications (CPDLC) enhances air traffic communication by replacing traditional voice transmissions with digital messages over Very High Frequency (VHF) radio systems. This transition improves communication resilience by providing clear, text-based instructions that reduce misunderstandings and increase bandwidth efficiency by enabling more data to be transmitted simultaneously. It benefits congested airspace by reducing radio frequency congestion and minimizing communication errors. However, due to the plain-text nature of its messages, CPDLC faces significant security challenges, making it vulnerable to cyber-attacks such as eavesdropping, modification, injection, and man-in-the-middle (MITM) attacks. This vulnerability allows motivated attackers to intercept CPDLC messages using inexpensive devices like Software-Defined Radio (SDR), HACKRF-one, and an antenna. Such breaches can lead to fatal safety incidents, severely impacting passengers and the aviation industry. To address this, we proposed a robust security framework for securing CPDLC communication by implementing critical measures, including mutual authentication, secure key establishment, and handover. The proposed framework has been tested on hardware to verify its effectiveness in practical scenarios, ensuring it aligns with existing CPDLC standards and integrates seamlessly into current systems without impacting operational efficiency. Our findings indicate that the proposed security framework enhances CPDLC's defenses against potential cyber threats while maintaining system performance, making it feasible to protect global air traffic communications.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE/AIAA Digital Avionics Systems Conference, ISSN 2155-7195, E-ISSN 2155-7209
Keywords
Aviation, CPDLC, Handover, Security, VHF
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-209995 (URN)10.1109/DASC62030.2024.10749527 (DOI)001453360400202 ()2-s2.0-85211215823 (Scopus ID)9798350349610 (ISBN)9798350349627 (ISBN)
Conference
AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), 29 Sept-3 Oct 2024, San Diego, CA, USA
Funder
EU, Horizon Europe, 101114635
Note

Funding Agencies|SESAR Joint Undertaking [101114635]

Available from: 2024-11-22 Created: 2024-11-22 Last updated: 2025-08-29Bibliographically approved
Zineddine, A., Chakir, O., Sadqi, Y., Maleh, Y., Singh Gaba, G., Gurtov, A. & Dev, K. (2024). A systematic review of cybersecurity assessment methods for HTTPS. Computers & electrical engineering, 115, Article ID 109137.
Open this publication in new window or tab >>A systematic review of cybersecurity assessment methods for HTTPS
Show others...
2024 (English)In: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 115, article id 109137Article, review/survey (Refereed) Published
Abstract [en]

Cybersecurity assessments are critical for ensuring that security measures in organizational infrastructures, systems, and applications meet necessary requirements. Given the significant HTTPS vulnerabilities exposed in recent years, assessing HTTPS deployments is increasingly important. However, there has been no systematic literature review (SLR) comparing different cybersecurity assessment methods specifically for HTTPS deployment security issues. This study aims to address this gap by identifying, analyzing, and comparing various HTTPS deployment assessment methods documented in scientific literature. Our approach involved a structured research methodology with specific inclusion and exclusion criteria for selecting relevant methods. The review utilizes 16 comparison metrics, divided into two categories: critical security metrics, focusing on assessment metrics adopted and the number of vulnerabilities evaluated by each method, and additional metrics assessing the methods’ applicability and effectiveness in real-world scenarios. The findings indicate varied adoption rates of these metrics among the reviewed cybersecurity assessment methods, highlighting the absence of a standardized approach using common, well-defined security metrics for HTTPS deployment assessment. In contrast, merging all the comparison metrics outlined in this review would enable a more in-depth assessment of HTTPS deployment security issues, enhance the quality of reported results, and lead to the development of a more practical assessment method.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Cybersecurity assessment, HTTPS deployment, Vulnerabilities, Security metrics, Applicability
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-201159 (URN)10.1016/j.compeleceng.2024.109137 (DOI)001204147300001 ()2-s2.0-85185829023 (Scopus ID)
Available from: 2024-02-24 Created: 2024-02-24 Last updated: 2025-02-07Bibliographically approved
Jensen, C., Karresand, M., Singh Gaba, G., Gurtov, A. & Öhrn, E. (2024). Are Swedish Passwords Tougher Than the Rest?. In: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings: . Paper presented at 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024. Springer
Open this publication in new window or tab >>Are Swedish Passwords Tougher Than the Rest?
Show others...
2024 (English)In: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings, Springer, 2024Conference paper, Published paper (Refereed)
Abstract [en]

In today’s digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. However, creating strong passwords that are easy to remember is hard. Often an individual’s language and cultural background influence password creation, which an attacker can exploit. This paper examines the importance of the User Context Bias (UCB) on Swedish passwords, versus international passwords stemming from multiple languages and cultures. This is done by employing four different password-cracking tools; Probabilistic Context Free Grammar (PCFG), Ordered Markov Enumerator (OMEN), Odinn, and Hashcat. The findings reveal that all the tools are able to crack a higher percentage of passwords when attacking those created by Swedish natives compared to their international counterparts. PCFG, in particular, is nearly twice as effective as the other tools against Swedish passwords after just 10,000 guesses, while OMEN is the best against Swedish passwords after 5 million guesses.

Place, publisher, year, edition, pages
Springer, 2024
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349
Series
Secure IT Systems, E-ISSN 1611-3349
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-211513 (URN)10.1007/978-3-031-79007-2_1 (DOI)001446544900001 ()2-s2.0-85218501734 (Scopus ID)9783031790065 (ISBN)9783031790072 (ISBN)
Conference
29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024
Available from: 2025-02-06 Created: 2025-02-06 Last updated: 2025-04-17
Khan, S., Singh Gaba, G., Boeira, F. & Gurtov, A. (2024). Formal Verification and Security Assessment of the Drone Remote Identification Protocol. In: : . Paper presented at 2nd International Conference on Unmanned Vehicle Systems-Oman (UVS), Muscat, Oman, 12-14 February. 2024.. Muscat, Oman: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Formal Verification and Security Assessment of the Drone Remote Identification Protocol
2024 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The worldwide implementation of Remote Identification (RID) regulations mandates unmanned aircraft systems (UAS), or drones, to openly transmit their identity and real-time location as plain text on the wireless channel. This mandate serves the purpose of accounting for and monitoring drone operations effectively. However, the current RID standard's plain-text transmission exposes it to cyberattacks, including eavesdropping, injection, and impersonation. The Drone Remote Identification Protocol (DRIP) has been proposed to enhance the security of RID. The DRIP ensures information secrecy and confidentiality by using unique session keys while guaranteeing the authenticity of messages and entities through digital signatures. These security features of DRIP make it a preferable alternative to the existing RID standard. However, the lack of verification regarding its security claims raises concerns about its performance in hostile conditions. This paper comprehensively analyzes the DRIP protocol's security features using Tamarin Prover, a formal security verification tool. With its automated reasoning capabilities, Tamarin Prover accurately identifies potential security vulnerabilities within the DRIP protocol while thoroughly verifying its conformance to security properties. Our investigation demonstrates that the DRIP protocol is susceptible to replay attacks. We strongly recommend the inclusion of message freshness components, reducing the lifespan of DET broadcasts, and incorporating a not-after timestamp that is set only a few minutes ahead of the current time. These measures enhance the protocol's defence against replay attacks and ensure message authenticity and Integrity.

Place, publisher, year, edition, pages
Muscat, Oman: Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Cybersecurity, DRIP, Formal verification, Tamarin, UAS.
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-201795 (URN)10.1109/UVS59630.2024.10467159 (DOI)001192218700014 ()9798350372557 (ISBN)9798350372564 (ISBN)
Conference
2nd International Conference on Unmanned Vehicle Systems-Oman (UVS), Muscat, Oman, 12-14 February. 2024.
Note

Funding Agencies|Automation Program II, Trafikverket

Available from: 2024-03-22 Created: 2024-03-22 Last updated: 2024-08-01Bibliographically approved
Zerhouni, K., Singh Gaba, G., Hedabou, M., Maksymyuk, T., Gurtov, A. & Amhoud, E. M. (2024). GAN-Based Evasion Attack in Filtered Multicarrier Waveforms Systems. IEEE Transactions on Machine Learning in Communications and Networking, 2, 210-220
Open this publication in new window or tab >>GAN-Based Evasion Attack in Filtered Multicarrier Waveforms Systems
Show others...
2024 (English)In: IEEE Transactions on Machine Learning in Communications and Networking, E-ISSN 2831-316X, Vol. 2, p. 210-220Article in journal (Refereed) Published
Abstract [en]

Generative adversarial networks (GANs), a category of deep learning models, have become a cybersecurity concern for wireless communication systems. These networks enable potential attackers to deceive receivers that rely on convolutional neural networks (CNNs) by transmitting deceptive wireless signals that are statistically indistinguishable from genuine ones. While GANs have been used before for digitally modulated single-carrier waveforms, this study explores their applicability to model filtered multi-carrier waveforms, such as orthogonal frequency-division multiplexing (OFDM), filtered orthogonal FDM (F-OFDM), generalized FDM (GFDM), filter bank multi-carrier (FBMC), and universal filtered MC (UFMC). In this research, an evasion attack is conducted using GAN-generated counterfeit filtered multi-carrier signals to trick the target receiver. The results show that there is a remarkable 99.7% probability of the receiver misclassifying these GAN-based fabricated signals as authentic ones. This highlights the need for urgent investigation into the development of preventive measures to address this concerning vulnerability.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Conditional generative adversarial networks, deep convolutional neural networks, evasion attack, filtered multicarrier waveforms
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-201155 (URN)10.1109/tmlcn.2024.3361834 (DOI)001487792500002 ()
Note

Funding Agencies|Mohammed VI Polytechnic University; ELLIIT project A4: Secure Transparent Communications in the Industrial Internet

Available from: 2024-02-23 Created: 2024-02-23 Last updated: 2025-05-28Bibliographically approved
Khan, S., Singh Gaba, G., Gurtov, A., Jansen, L. J. .., Mäurer, N. & Schmitt, C. (2024). Post Quantum Secure Handover Mechanism for Next Generation Aviation Communication Networks. IEEE Transactions on Green Communications and Networking, 8(3), 939-955
Open this publication in new window or tab >>Post Quantum Secure Handover Mechanism for Next Generation Aviation Communication Networks
Show others...
2024 (English)In: IEEE Transactions on Green Communications and Networking, E-ISSN 2473-2400, Vol. 8, no 3, p. 939-955Article in journal (Refereed) Published
Abstract [en]

The L-band Digital Aeronautical Communications System (LDACS) is a key advancement for next-generation aviation networks, enhancing Communication, Navigation, and Surveillance (CNS) capabilities. It operates with VHF Datalink mode 2 (VDLm2) and features a seamless handover mechanism to maintain uninterrupted communication between aircraft and ground stations (GSs), improving safety and efficiency in air traffic management (ATM). However, LDACS’ handover process encounters significant security risks due to inadequate authentication and key agreement between aircraft and ground station controllers (GSCs) during handovers. This vulnerability threatens communications’ confidentiality, integrity, and authenticity, posing risks to flight safety and sensitive data. Therefore, developing and implementing a robust security framework to protect aviation communications is essential. In response, we have proposed a security solution specifically designed to protect LDACS handovers. Our solution uses a mutual authentication and key agreement mechanism tailored for LDACS handovers, ensuring robust security for all types of handovers, including Intra GSC - Intra Aeronautical Telecommunication Network (ATN), Inter GSC - Intra ATN, and Inter GSC - Inter ATN. Our approach utilizes post-quantum cryptography to protect aviation communication systems against potential post-quantum threats, such as unauthorized access to flight data, interception of communication, and spoofing of aircraft identity. Furthermore, our proposed solution has undergone a thorough informal security analysis to ensure its effectiveness in addressing handover challenges and offering robust protection against various threats. It seamlessly integrates with the LDACS framework, delivering low Bit Error Rate (BER) and latency levels, making it a highly reliable approach in practice.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Aviation Network, Aviation Security, BIKE, FCI, LDACS
National Category
Electrical Engineering, Electronic Engineering, Information Engineering Communication Systems
Identifiers
urn:nbn:se:liu:diva-206859 (URN)10.1109/tgcn.2024.3417298 (DOI)001302503300012 ()
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Swedish Transport AdministrationEU, Horizon Europe, 101114635
Note

Funding Agencies|Trafikverket, Sweden; Luftfartsverket, Sweden; Wallenberg AI, Autonomous Systems and Software Program (WASP), Sweden; SESAR Joint Undertaking - European Union's [101114635]

Available from: 2024-08-24 Created: 2024-08-24 Last updated: 2024-10-07
Organisations

Search in DiVA

Show all publications

Profile pages