{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:13:02Z","timestamp":1769551982966,"version":"3.49.0"},"reference-count":174,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3420091","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T20:41:06Z","timestamp":1719520866000},"page":"91101-91126","source":"Crossref","is-referenced-by-count":8,"title":["Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9246-0263","authenticated-orcid":false,"given":"Marcus","family":"Dansarie","sequence":"first","affiliation":[{"name":"Department of Systems Science for Defence and Security, Swedish Defence University, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9001-y"},{"key":"ref3","first-page":"1","article-title":"Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks","volume-title":"Proc. 6th USENIX Workshop Offensive Technol.","author":"Weinmann"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref5","first-page":"1","article-title":"Green lights forever: Analyzing the security of traffic infrastructure","volume-title":"Proc. 8th USENIX Workshop Offensive Technol.","author":"Ghena"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref7","volume-title":"Signal Identification Guide","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/spacesec.2023.231879"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590190"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10351029"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991094"},{"key":"ref13","first-page":"237","article-title":"Gone in 360 seconds: Hijacking with Hitag2","volume-title":"Proc. USENIX","author":"Verdult"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0002.2100036"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102516"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41826-7_9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2014.02.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100549"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2612584"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16874-2_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.10.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75307-2_12"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007182"},{"key":"ref25","volume-title":"A Survey on Security and Privacy of Automatic Dependent Surveillance-Broadcast (ADS-B) Protocol: Challenges, Potential Solutions and Future Directions","author":"Ahmed","year":"2020"},{"key":"ref26","first-page":"41","article-title":"Identification of ADS-B system vulnerabilities and threats","volume-title":"Proc. 33rd Australas. Transp. Res. Forum","author":"Purton"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.001"},{"key":"ref28","volume-title":"Ghost in the Air(Traffic): On Insecurity of ADS-B Protocol and Practical Attacks on ADS-B Devices","author":"Costin","year":"2012"},{"key":"ref29","volume-title":"Hackers+Airplanes: No Good Can Come of This","author":"Haines","year":"2012"},{"key":"ref30","volume-title":"Exploiting the Automatic Dependent Surveillance-Broadcast System via False Target Injection","author":"Magazu","year":"2012"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS50378.2020.9222945"},{"key":"ref33","volume-title":"The ADS-B Protocol and Its Weaknesses: Exploring Potential Attack Vectors","author":"Sj\u00f6din","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC57344.2023.10099369"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2021.3139559"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3164704"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-018-0188-y"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2019.8903699"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.29007\/dd4b"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2001.964200"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0023"},{"key":"ref42","volume-title":"Security Risks of Laptops in Airline Cockpits","author":"Wolper","year":"1998"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.5347501"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.127"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSurv.2013.6548566"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486395"},{"key":"ref47","article-title":"Analyzing privacy breaches in the aircraft communications addressing and reporting system (ACARS)","volume-title":"arXiv:1705.07065","author":"Smith","year":"2017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2001.964182"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_15"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2018.8384830"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2767059"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2001.964187"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.104"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/s18051636"},{"key":"ref55","volume-title":"Libacars","author":"Lemiech","year":"2023"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS52807.2021.9441649"},{"key":"ref57","volume-title":"Dumpvdl2","author":"Lemiech","year":"2023"},{"key":"ref58","first-page":"53","article-title":"You Talkin to me? Exploring practical attacks on controller pilot data link communications","volume-title":"Proc. 7th ACM Cyber-Phys. Syst. Secur. Workshop","author":"Smailes"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564651"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.23919\/NTCA50409.2020.9291180"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162216"},{"key":"ref62","article-title":"Exploring the vulnerabilities of traffic collision avoidance systems (TCAS) through software defined radio (SDR) exploitation","author":"Berges","year":"2019"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3169\/itej.65.1186"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-021-00238-2"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03766-9"},{"key":"ref66","volume-title":"A Cyber Threat Taxonomy and a Viability Analysis for False Injections in the TCAS","author":"Hannah","year":"2021"},{"key":"ref67","volume-title":"Analysis of the Cyber Attacks Against ADS-B Perspective of Aviation Experts","author":"Pantoja Viveros","year":"2016"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23022"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3198947"},{"key":"ref70","volume-title":"CVE-2021\u201344228","year":"2021"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2004.1398905"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.hspr.2022.12.001"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2017.52"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2590579"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2802444"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3300179"},{"key":"ref77","volume-title":"Open Rails","year":"2024"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33675-1_22"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33951-1_4"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930138"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/373243.360213"},{"issue":"1","key":"ref82","first-page":"207","article-title":"Safety analysis of cryptography mechanisms used in GSM for railway","volume":"6","author":"Franekov\u00e1","year":"2011","journal-title":"Ann. Fac. Eng. Hunedoar Int. J. Eng."},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053027"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/RRCON.2005.186085"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1115\/JRC2019-1236"},{"key":"ref86","volume-title":"ATCS Monitor for Windows","author":"Houy","year":"2010"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100571"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34671-2_29"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.3390\/app11115015"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664257"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.21278\/brod68106"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3158943"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1427"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.082713.00034"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/fi5020205"},{"key":"ref96","first-page":"1469","article-title":"The vulnerability analysis and improvement of the TETRA authentication protocol","volume-title":"Proc. Int. Conf. Adv. Commun. Technol. (ICACT)","volume":"2","author":"Park"},{"issue":"1","key":"ref97","first-page":"88","article-title":"Security analysis of the Terrestrial Trunked Radio (TETRA) authentication protocol","volume":"2","author":"Duan","year":"2013","journal-title":"Norsk Informasjonssikkerhetskonferanse (NISK)"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC58029.2023.10200747"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050046"},{"key":"ref102","first-page":"7463","article-title":"All cops are broadcasting: TETRA under scrutiny","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Meijer"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998426"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994463"},{"key":"ref105","volume-title":"OsmocomTETRA","year":"2023"},{"key":"ref106","volume-title":"Dizzy","year":"2018"},{"key":"ref107","first-page":"49","article-title":"Why (special agent) Johnny (still) cant encrypt: A security analysis of the APCO project 25 two-way radio system","volume-title":"Proc. 20th USENIX Secur. Symp.","author":"Clark"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31909-9_7"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582395"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2021.i3.36-53"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2022.i3.217-238"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2023.i4.58-82"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54776-8_14"},{"key":"ref114","first-page":"1","article-title":"deDECTed","volume-title":"Proc. 25th Chaos Comput. Congr.","author":"Schuler"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_4"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13858-4_1"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.806129"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24209-0_12"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_14"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0127-4"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz037"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2009.20"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1002\/sec.989"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.26"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289150"},{"key":"ref126","article-title":"DECT security analysis","author":"Tews","year":"2012"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.18"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/2535522"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843357"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3139614"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43933-3_25"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8233661"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9230-8"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3271994"},{"key":"ref135","first-page":"257","article-title":"Satellite communication without privacy\u2013Attackers paradise","volume-title":"Sicherheit\u2014Schutz und Zuverl\u00e4ssigkeit","author":"Adelsbach","year":"2005"},{"key":"ref136","first-page":"1","article-title":"Anonymous data broadcasting by misuse of satellite ISPs","volume-title":"Proc. 22nd Chaos Commun. Congr.","author":"Adelsbach"},{"key":"ref137","volume-title":"Satellite Turla: APT Command and Control in the Sky","author":"Tanase","year":"2015"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323418"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00056"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.23919\/cycon55549.2022.9811060"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.14722\/spacesec.2023.238916"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_6"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183471"},{"key":"ref144","first-page":"5","article-title":"La cryptographie militaire","volume":"1","author":"Kerckhoffs","year":"1883","journal-title":"J. des Sci. militaires"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref146","article-title":"The (in)security of proprietary cryptography","author":"Verdult","year":"2015"},{"key":"ref147","volume-title":"Inter-Protocol Exploitation","author":"Alcorn","year":"2007"},{"key":"ref148","first-page":"1","article-title":"Packets in packets: Orson Welles in-band signaling attacks for modern radios","volume-title":"Proc. USENIX Workshop Offensive Technol. (WOOT)","author":"Goodspeed"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0010068"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-011-0494-7"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3546096.3546101"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.14722\/spacesec.2023.239280"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/35.393001"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2014.6950516"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70052-1"},{"key":"ref156","volume-title":"ACARSDEC","author":"Leconte","year":"2023"},{"key":"ref157","volume-title":"OsmocomDECT","year":"2024"},{"key":"ref158","volume-title":"OsmocomGMR","year":"2024"},{"key":"ref159","volume-title":"ACARSGen","author":"Juvonen","year":"2022"},{"key":"ref160","volume-title":"ADS-B Out","author":"Yusupov","year":"2021"},{"key":"ref161","volume-title":"AIS Tools","author":"Kessler","year":"2023"},{"key":"ref162","volume-title":"AISTX","author":"Balduzzi","year":"2020"},{"key":"ref163","volume-title":"BinNavi","year":"2020"},{"key":"ref164","volume-title":"Dump 1090","author":"Sanfilippo","year":"1090"},{"key":"ref165","volume-title":"Dump 978","author":"Jowett","year":"2023"},{"key":"ref166","volume-title":"DVBsnoop","author":"Scherg","year":"2007"},{"key":"ref167","volume-title":"Wireshark","year":"2024"},{"key":"ref168","volume-title":"JAERO","author":"Olds","year":"2023"},{"key":"ref169","volume-title":"Kismet","year":"2022"},{"key":"ref170","volume-title":"OpenCPN","year":"2022"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644682"},{"key":"ref172","volume-title":"Operation RUBICON: The Secret Purchase of Crypto AG by BND and CIA","author":"Reuvers","year":"2020"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref174","volume-title":"Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities","year":"2018"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10574808.pdf?arnumber=10574808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T05:34:40Z","timestamp":1720330480000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10574808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":174,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3420091","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}