Mostrar el registro sencillo del ítem
Análisis De Riesgos Cibernéticos Para Sistemas ADS-B (Automatic Dependent Surveillance Broadcast) Durante Operaciones Aéreas
| dc.contributor.author | López, Víctor | |
| dc.coverage.spatial | Colombia, Escuela Superior de Guerra “General Rafael Reyes Prieto”, 2025 | |
| dc.date.accessioned | 2026-04-28T20:32:04Z | |
| dc.date.available | 2026-04-28T20:32:04Z | |
| dc.date.issued | 2025-10-21 | |
| dc.date.submitted | 2025-10-21 | |
| dc.identifier.citation | APA | es_ES |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11731 | |
| dc.description.abstract | El sistema ADS-B (Automatic Dependent Surveillance-Broadcast) ha fortalecido la vigilancia aérea al ofrecer actualizaciones de mayor precisión y en tiempo real de la posición de aeronaves, mejorando la gestión del tráfico aéreo. Sin embargo, su diseño abierto, sin mecanismos de cifrado ni autenticación, se han expuesto vulnerabilidades frente a ciberataques como la inyección de mensajes, GPS spoofing, modificación y eliminación de mensajes. Este artículo analiza mencionadas vulnerabilidades, su impacto en la operación aérea y las posibles estrategias de mitigación basadas en los modelos FAST y STRIDE. Se propone además el procedimiento C.A.R.E. (Coordinación, Autenticación, Respuesta y Evaluación) como iniciativa para fortalecer la resiliencia cibernética del sistema en Colombia, complementado con un modelo híbrido de gestión de riesgos utilizando FAST y mapas cognitivos difusos. The Automatic Dependent Surveillance-Broadcast (ADS-B) system has strengthened air traffic surveillance by providing more accurate and real-time updates of aircraft positions, enhancing air traffic management. However, its open design, lacking encryption and authentication mechanisms, has exposed vulnerabilities to cyberattacks such as message injection, GPS spoofing, message modification, and deletion. This article analyzes these vulnerabilities, their impact on air operations, and possible mitigation strategies based on the FAST and STRIDE models. Additionally, the C.A.R.E. protocol (Coordination, Authentication, Response, and Evaluation) is proposed as an initiative to enhance the cyber resilience of the system in Colombia, complemented by a hybrid risk management model using fuzzy cognitive maps. | es_ES |
| dc.description.sponsorship | Escuela Superior de Guerra “General Rafael Reyes Prieto” | es_ES |
| dc.format.extent | 68 páginas | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Análisis De Riesgos Cibernéticos Para Sistemas ADS-B (Automatic Dependent Surveillance Broadcast) Durante Operaciones Aéreas | es_ES |
| dcterms.bibliographicCitation | Abu Al-Haija, M., & Al-Tamimi, F. (2024). ADS-B security vulnerabilities and attack mitigations. Journal of Aerospace Cybersecurity, 12(1), 10-11. | es_ES |
| dcterms.bibliographicCitation | Abu Al-Haija, Q., & Al-Tamimi, A. (2024). Secure aviation control through a streamlined ADS-B perception system. Applied System Innovation, 7(2), 27. | es_ES |
| dcterms.bibliographicCitation | Aerocivil. (2023). Reporte de ciberseguridad en la aviación colombiana. Unidad Administrativa Especial de Aeronáutica Civil, p. 18. | es_ES |
| dcterms.bibliographicCitation | Agbeyibor, R. C. (2014). Secure ADS-B: Towards Airborne Communications Security in the Federal Aviation Administration’s Next Generation Air Transportation System (Tesis de maestría, Air Force Institute of Technology). https://scholar.afit.edu/etd/584 | es_ES |
| dcterms.bibliographicCitation | Ahmed, W. (2024). ADS-B Communication in Modern Air Traffic Management: Threats, Risks and Security Solutions. | es_ES |
| dcterms.bibliographicCitation | Ahmed, W., Bhatti, N. A., Masood, A., Alharbi, A. A. K., & Alotaibi, S. (2024). Advancements in ADS-B security: A comprehensive survey of vulnerabilities, mitigation strategies, system requirements, and emerging research trends (p. 11). Preprints.org. https://doi.org/10.20944/preprints202405.0586.v2 | es_ES |
| dcterms.bibliographicCitation | Amin, S., Clark, T., & Offutt, R. (2014). Design of a cyber security framework for ADS-B based surveillance systems. | es_ES |
| dcterms.bibliographicCitation | Benavides Moncayo, O. L. (2016). Consideraciones para la implementación del sistema de Vigilancia Dependiente Automática – Radiodifusión (ADS-B) en Colombia. Revista Visión Electrónica. Universidad Distrital Francisco José de Caldas. | es_ES |
| dcterms.bibliographicCitation | Bria, O., & Giacomantone, J. (2020). Colaboración ADS-B en la Predicción SSR. | es_ES |
| dcterms.bibliographicCitation | Brown, R., Lee, H., & Smith, A. (2023). Deep learning for anomaly detection in GPS navigation systems. IEEE Transactions on Aerospace and Electronic Systems, 59(2), 154–169. | es_ES |
| dcterms.bibliographicCitation | Cadena, E. L. (2019). Requerimientos de ADS-B en Colombia: optimizar procedimientos de instalación. Foro Regulatorio Informativo, Bogotá - Colombia. Aeronáutica Civil de Colombia. | es_ES |
| dcterms.bibliographicCitation | Caparroso, J. (2023). Incremento del ransomware en el sector aeronáutico en Colombia durante 2022. Lumu Advisory Report, 30. | es_ES |
| dcterms.bibliographicCitation | CASA. (2016). Questions and Answers for Owners of Australian General Aviation Aircraft. | es_ES |
| dcterms.bibliographicCitation | Costigan, S., & Hennessy, M. (2023). Cybersecurity education frameworks for critical infrastructure sectors. Cybersecurity Policy and Practice Review, 7(4), 50–64. | es_ES |
| dcterms.bibliographicCitation | Cretin, A., Vernotte, A., Chevrot, A., Peureux, F., & Legeard, B. (2020). Test data generation for false data injection attack testing in air traffic surveillance. IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 143-152. | es_ES |
| dcterms.bibliographicCitation | Elmarady, A.A.W., & Rahouma, K. (2021). Actual TDoA-based augmentation system for enhancing cybersecurity in ADS-B. | es_ES |
| dcterms.bibliographicCitation | Federal Aviation Administration (FAA). (2022). ADS-B Operations Manual. | es_ES |
| dcterms.bibliographicCitation | Federal Aviation Administration (FAA). (2022). Automatic Dependent Surveillance-Broadcast Operations (AC 90-114B). FAA. Disponible en: https://www.faa.gov/regulations_policies/advisory_circulars. | es_ES |
| dcterms.bibliographicCitation | Florez, J. A., Avendaño Hurtado, J. L. E., Barragán, C. U., & Díaz, L. A. (2023). Estrategia de resiliencia para los servicios de vigilancia aeronáutica en Colombia. Congreso de Desarrollo Aeroespacial Colombiano, 19-20 de octubre de 2023. Aeronáutica Civil de Colombia. | es_ES |
| dcterms.bibliographicCitation | Gómez, L. (2015). Vigilancia Dependiente Automática (ADS-B) en Colombia. Ciencia y Poder Aéreo, 10(1), 21-32. Escuela de Postgrados de la Fuerza Aérea Colombiana. https://doi.org/10.18667/cienciaypoderaereo.215. | es_ES |
| dcterms.bibliographicCitation | Haass, J. C., Craiger, J. P., & Kessler, G. C. (2018). A Framework for Aviation Cybersecurity. IEEE Aerospace Conference. Embry-Riddle Aeronautical University, USA. doi: 10.1109/AERO.2018.1234567. | es_ES |
| dcterms.bibliographicCitation | Habler, E., & Shabtai, A. (2018). Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. Computers & Security, 78, 155-173. | es_ES |
| dcterms.bibliographicCitation | Haines, B., & Foster, N. (2012). Exploiting the Automatic Dependent Surveillance-Broadcast System via False Target Injection. Presentado en DefCon 20 | es_ES |
| dcterms.bibliographicCitation | Hassan, M., Rahman, M., Ahmed, K., & Ali, A. (2024). Performance Analysis of Machine Learning Algorithms in Detecting Cyber Attacks Targeting ADS-B. | es_ES |
| dcterms.bibliographicCitation | Holemans, L. (2016). Securing automatic dependent surveillance broadcast (ADS-B) transmissions against spoofing. Utica College. | es_ES |
| dcterms.bibliographicCitation | Holemans, T. (2016). Cybersecurity risks in air traffic management. International Journal of Critical Infrastructure Protection, 8(3), 14-15. | es_ES |
| dcterms.bibliographicCitation | Indra. (2020). Sistema ADS-B en la Gestión del Tráfico Aéreo. Disponible en: https://www.indracompany.com. | es_ES |
| dcterms.bibliographicCitation | Kacem, T. (2016). Secure ADS-B (Doctoral dissertation). George Mason University, Fairfax, VA. | es_ES |
| dcterms.bibliographicCitation | Kacem, T., Wijesekera, D., & Costa, P. (2015). Integrity and Authenticity of ADS-B Broadcasts. IEEE Aerospace Conference, Big Sky, MT. | es_ES |
| dcterms.bibliographicCitation | Kacem, T., Wijesekera, D., Costa, P., Monteiro, M., & Barreto, A. (2015). Secure ADS-B Design & Evaluation. IEEE International Conference on Vehicular Electronics and Safety (ICVES), Yokohama, Japan. | es_ES |
| dcterms.bibliographicCitation | Klir, G. J., & Yuan, B. (1995). Fuzzy Sets and Fuzzy Logic: Theory and Applications. Prentice Hall. | es_ES |
| dcterms.bibliographicCitation | Lubbe, H., Serfontein, R., & Coetzee, M. (2024). Assessing the effectiveness of ADS-B mitigations. ICCWS 2024. | es_ES |
| dcterms.bibliographicCitation | Manesh, M. R. (2019). Investigating ADS-B spoofing threats. IEEE Aerospace Conference, 80. | es_ES |
| dcterms.bibliographicCitation | Manesh, M. R., & Kaabouch, N. (2017). Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system. International Journal of Critical Infrastructure Protection, 19, 16–31. https://doi.org/10.1016/j.ijcip.2017.10.002. | es_ES |
| dcterms.bibliographicCitation | MinTIC. (2023). Plan de Ciberseguridad y Ciberdefensa Nacional 2023–2026. Ministerio de Tecnologías de la Información y las Comunicaciones, p. 33. | es_ES |
| dcterms.bibliographicCitation | Monteiro, M., Barreto, A., Kacem, T., Carvalho, J., & Wijesekera, D. (2015). Detecting Malicious ADS-B Broadcasts Using Wide Area Multilateration. Digital Avionics Systems Conference (DASC), IEEE/AIAA 34th. | es_ES |
| dcterms.bibliographicCitation | Organización de Aviación Civil Internacional (OACI). (2014). ADS-B Implementation and Operations Guidance Document. | es_ES |
| dcterms.bibliographicCitation | Organización de Aviación Civil Internacional (OACI). (2019). Estrategia de ciberseguridad de la aviación. OACI. https://www.icao.int/cybersecurity/Pages/Cybersecurity-Strategy.aspx. | es_ES |
| dcterms.bibliographicCitation | Ray, G., & Ray, J. (2023). Detecting ADS-B Replay Cyberattacks in the National Airspace System. Issues in Information Systems, 24(1), 170-185. | es_ES |
| dcterms.bibliographicCitation | Ronen, E., & Ben-Moshe, T. (2021). GPS spoofing detection using deep learning for aviation applications. Sensors, 21(4), 1451. https://doi.org/10.3390/s21041451 | es_ES |
| dcterms.bibliographicCitation | Strohmeier, M., Lenders, V., & Martinovic, I. (2014). Realities and challenges of NextGen air traffic management: The case of ADS-B. IEEE Communications Magazine, 52(5), 111–118. https://doi.org/10.1109/MCOM.2014.6815901. | es_ES |
| dcterms.bibliographicCitation | Strohmeier, M., Lenders, V., & Martinovic, I. (2015). On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Communications Surveys & Tutorials, 17(2), 1066-1087. doi: 10.1109/COMST.2014.2365951 | es_ES |
| dcterms.bibliographicCitation | Universal Avionics. (2016). Comprendiendo el cumplimiento del ADS-B Out. Disponible en: https://www.universalavionics.com. | es_ES |
| dcterms.bibliographicCitation | Zadeh, L. (1965). Fuzzy Sets. Information and Control, 8(3), 338-353. https://doi.org/10.1016/S0019-9958(65)90241-X. | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_16ec | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_6501 | es_ES |
| oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | Flórez, Jimmy | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Maestría en Ciberseguridad y Ciberdefensa | es_ES |
| dc.relation.citationEdition | 68 páginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.subject.keywords | ADS-B; ciberseguridad; FAST y STRIDE; procedimiento C.A.R.E.; Riesgos, Vulnerabilidades. ADS-B; C.A.R.E. protocol; cybersecurity; FAST and STRIDE model; risks; vulnerabilities. | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.type.spa | Artículo | es_ES |


