Information Security Risk Analysis of Airborne Communication Network

  • Shi Dong Luo*
  • , Xiao Hong Bao
  • , Yu Xin
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Under the conditions of informationization and networked operations, the airborne communication network faces serious threats. Any unit under the network system needs to acquire and share real-time information. In this process, the information security problem of the airborne communication network is particularly important, ensuring the confidentiality, integrity and availability of the transmitted information can largely guarantee the smooth completion of the task. In view of this, this paper uses the decision of the key nodes of complex networks and the risk analysis method of the attack tree model to evaluate the information security of the airborne communication network. This method helps decision-makers find important communication nodes in the airborne communication network and the attack methods most likely to be exploited by attackers, then taking targeted defense measures.

Original languageEnglish
Title of host publicationProceedings of 2019 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, QR2MSE 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages77-83
Number of pages7
ISBN (Electronic)9781728114279
DOIs
StatePublished - Aug 2019
Event2019 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, QR2MSE 2019 - Zhangjiajie, Hunan, China
Duration: 6 Aug 20199 Aug 2019

Publication series

NameProceedings of 2019 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, QR2MSE 2019

Conference

Conference2019 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, QR2MSE 2019
Country/TerritoryChina
CityZhangjiajie, Hunan
Period6/08/199/08/19

Keywords

  • airborne communication network
  • attack tree
  • complex network
  • information security

Fingerprint

Dive into the research topics of 'Information Security Risk Analysis of Airborne Communication Network'. Together they form a unique fingerprint.

Cite this