{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T09:11:03Z","timestamp":1771492263094,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2018,5,20]],"date-time":"2018-05-20T00:00:00Z","timestamp":1526774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"LFV","award":["CybSec"],"award-info":[{"award-number":["CybSec"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The increased utilization of the new types of cockpit communications, including controller\u2013pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system.<\/jats:p>","DOI":"10.3390\/s18051636","type":"journal-article","created":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T04:07:30Z","timestamp":1526875650000},"page":"1636","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Controller\u2013Pilot Data Link Communication Security"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9829-9287","authenticated-orcid":false,"given":"Andrei","family":"Gurtov","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, Link\u00f6ping University, Campus Valla, SE-581 83 Link\u00f6ping, Sweden"}]},{"given":"Tatiana","family":"Polishchuk","sequence":"additional","affiliation":[{"name":"Communications and Transport Systems, Link\u00f6ping University, Campus Norrk\u00f6ping, SE-601 74 Norrk\u00f6ping, Sweden"}]},{"given":"Max","family":"Wernberg","sequence":"additional","affiliation":[{"name":"Communications and Transport Systems, Link\u00f6ping University, Campus Norrk\u00f6ping, SE-601 74 Norrk\u00f6ping, Sweden"}]}],"member":"1968","published-online":{"date-parts":[[2018,5,20]]},"reference":[{"key":"ref_1","unstructured":"Strohmeier, M. (2016). Security in Next Generation Air Traffic Communication Networks. [Ph.D. Thesis, University of Oxford]."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Storck, P.E. (2013, January 22\u201325). Benefits of commercial data link security. Proceedings of the 2013 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA.","DOI":"10.1109\/ICNSurv.2013.6548657"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Smith, M., Moser, D., Strohmeier, M., Lenders, V., and Martinovic, I. (arXiv, 2017). Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS), arXiv.","DOI":"10.1515\/popets-2018-0023"},{"key":"ref_4","unstructured":"(2018, May 15). CANCO Vision 2020. Available online: https:\/\/www.canso.org\/vision-2020."},{"key":"ref_5","first-page":"1338","article-title":"On Perception and Reality in Wireless Air Traffic Communication Security","volume":"18","author":"Strohmeier","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_6","unstructured":"Strohmeier, M., Lenders, V., and Martinovic, I. (arXiv, 2013). Security of ADS-B: State of the Art and Beyond, arXiv."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Di Marco, D., Manzo, A., and Ivaldi, M. (September, January 31). Security Testing with Controller-Pilot Data Link Communications. Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria.","DOI":"10.1109\/ARES.2016.104"},{"key":"ref_8","unstructured":"McParland, T., Patel, V., and Hughes, W. (2001, January 14\u201318). Securing air-ground communications. Proceedings of the 20th Digital Avionics Systems Conference, Daytona Beach, FL, USA."},{"key":"ref_9","unstructured":"Olive, M. (2001, January 14\u201318). Efficient datalink security in a bandwidth-limited mobile environment\u2014An overview of the Aeronautical Telecommunications Network (ATN) security concept. Proceedings of the 20th Digital Avionics Systems Conference, Daytona Beach, FL, USA."},{"key":"ref_10","unstructured":"Getachew, D., and Griner, J.H. (2005, January 3\u20137). An Elliptic Curve Based Authentication Protocol For Controller-Pilot Data Link Communications. Proceedings of the 29th IEEE\/AIAA Digital Avion- ics Systems Conference, Salt Lake City, UT, USA."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bone, R., and Long, K. (2016, January 19\u201321). Air Traffic Controller Utilization of Voice and Data Link Communication During Interval Management. Proceedings of the 2016 Integrated Communications Navigation and Surveillance (ICNS), Herndon, VA, USA.","DOI":"10.1109\/ICNSURV.2016.7486335"},{"key":"ref_12","unstructured":"(2018, January 18). Estimated Annual Growth Rates for Passenger Air Traffic from 2017 to 2036, by Region. Available online: https:\/\/www.statista.com\/statistics\/269919\/growth-rates-for-passenger-and-cargo-air-traffic\/."},{"key":"ref_13","unstructured":"Massimini, P.A., Dieudonne, J.E., Monticone, L.C., Lamiani, D.F., and Brestle, E.A. (1999, January 24\u201329). Insertion of Controller-Pilot Data Link Communication into the National Airspace System: Is It More Efficient?. Proceedings of the 18th Digital Avionics Systems Conference on Gateway to the New Millennium, St Louis, MO, USA."},{"key":"ref_14","unstructured":"International Civil Aviation Organization (ICAO) (2013). Global Operational Data Link Document (GOLD), ICAO."},{"key":"ref_15","unstructured":"(2010). VHF Air-Ground Digital Link (VDL) Mode 2; Technical Characteristics and Methods of Measurements for Ground-Based Equipment; Part 1: Physical Layer and MAC Sub-Layer, European Telecommunications Standards Institute."},{"key":"ref_16","unstructured":"Burton, B. (2018, May 15). Data Link Deep Dive. Available online: http:\/\/travelsdocbox.com\/Air_Travel\/69439411-Datalink-deep-dive-brandon-burton.html."},{"key":"ref_17","unstructured":"Imai, H. (2006). Wireless Communications Security, Artech House."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1504\/IJAHUC.2014.066419","article-title":"Jamming and anti\u2013jamming techniques in wireless networks: a survey","volume":"17","author":"Grover","year":"2014","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"ref_19","unstructured":"Eurocontrol (2018, May 15). CPDLC Incorrect Call Sign on Log-on. Available online: https:\/\/www.skybrary.aero\/index.php\/CPDLC_Incorrect_Call_Sign_on_Log-on."},{"key":"ref_20","first-page":"92","article-title":"Analysis of the CPDLC real time characteristics and the Mode S data link capacity","volume":"310","author":"Gil","year":"2008","journal-title":"Sitraer 7"},{"key":"ref_21","unstructured":"Nichols, R.K., and Lekkas, P.C. (2002). Wireless Security: Models, Threats, and Solutions, McGraw-Hill."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","article-title":"The Advantages of Elliptic Curve Cryptography for Wireless Security","volume":"11","author":"Lauter","year":"2004","journal-title":"Wirel. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSP.2016.120","article-title":"A riddle wrapped in an enigma","volume":"4","author":"Koblitz","year":"2016","journal-title":"IEEE Secur. Priv."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Gurtov, A. (2008). Host Identity Protocol (HIP): Towards the Secure Mobile Internet, Wiley.","DOI":"10.1002\/9780470772898"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/SURV.2010.021110.00070","article-title":"Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks","volume":"12","author":"Nikander","year":"2010","journal-title":"Commun. Surv. Tuts."},{"key":"ref_26","unstructured":"Moskowitz, R., and Hummen, R. (2018, May 15). HIP Diet EXchange (DEX), Internet Draft. Available online: https:\/\/datatracker.ietf.org\/doc\/draft-ietf-hip-dex\/."},{"key":"ref_27","unstructured":"(2018, May 15). Aeronautical Mobile Airport Communication System (AeroMACS). Available online: http:\/\/wimaxforum.org\/Page\/AeroMACS."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/TIFS.2016.2647225","article-title":"Anonymous Secure Framework in Connected Smart Home Environments","volume":"12","author":"Kumar","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","article-title":"Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments","volume":"16","author":"Kumar","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_30","unstructured":"(2016). IEEE Std 802.15.9-2016: IEEE Recommended Practice for Transport of Key Management Protocol (KMP) Datagrams, IEEE."},{"key":"ref_31","unstructured":"Willis, P. (2017). Line of Attack. Cybersecurity, Air Traffic Technology International."},{"key":"ref_32","unstructured":"Identity-Defined Network (IDN) (2018, May 15). Tempered Networks Whitepaper. Available online: https:\/\/www.temperednetworks.com\/resources\/whitepapers\/technical-white-paper."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1636\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:05:08Z","timestamp":1760195108000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,20]]},"references-count":32,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2018,5]]}},"alternative-id":["s18051636"],"URL":"https:\/\/doi.org\/10.3390\/s18051636","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,20]]}}}