Accesso libero

GPS Characterization in Cyberspace Between Vulnerability and Geo-Encryption: Impact on GBAS Landing System (GLS)

INFORMAZIONI SU QUESTO ARTICOLO

Cita

In the cyberterrorism concept, whoever was the type of terrorist group: Religious, Ethno-nationalist separatist, Revolutionary, and Far-right extremist, the most efficient deterrence solution locates in the end-user’s protection and hardening. In the cyberterrorism activities, either disruptive and/or destructive, people tend to be the softest link in security chain. Therefore, the threat source would be less important compared with the way of protection. Many efforts have been performed in strengthening the farend-recipients’ infrastructure of communications and critical information systems. Amongst, is the Geo-Encryption Cryptographic Algorithm. It depends on adding a new layer of security by using the most vulnerable signals to cyber-attacks, which is the GPS signals. Hence, its strength came out from its weakness. The Geo-encryption technique assumes the use of anti-jam and anti-spoof GPS receivers, which without, the model would be of no added value to the end-users’ security. In this study, an assessment of the model performance among vulnerability challenges is conducted, showing the characterization of the GPS tool in such model being a solution while it is simultaneously a vulnerable target. A special focus was put in the GBAS Landing System (GLS) performance, in both military and civilian aviation aspect.

eISSN:
2247-840X
Lingua:
Inglese