JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (11): 1-6.doi: 10.6040/j.issn.1671-9352.0.2016.404

    Next Articles

Architecture and key technologies of network-enabled next generation global flight tracking based on information integration and sharing

WU Zhi-jun, SHEN Dan-dan   

  1. College of Electronics Information &
    Automation, Civil Aviation University of China, Tianjin 300300, China
  • Received:2016-09-01 Online:2016-11-20 Published:2016-11-22

Abstract: Information integration and network-enable have become the main characteristics of the next generation air traffic management system. In order to guarantee the real-time and precise tracking of global flights, this paper designs the integrated space-air-ground network architecture of global flight tracking based on information integration and sharing, studies the key technology of integrated aeronautical network-enabled information assurance system based on networked authentication, realizes the integrated, interoperable, reliable and efficient air traffic management by using collaborative decision marking(CDM)that supported by system wide information management(SWIM), provides safe, reliable, efficient, and fast operational services, and achieves the goal of global flight tracking based on the integrated space-air-ground network.

Key words: global flight tracking, information integration, operational safety, network-enabled, information security

CLC Number: 

  • TP309
[1] ICAO. Multidisciplinary meeting regarding global tracking[EB/OL].[2016-08-23].
[2] 国际民航组织. 全球航空安全计划:2014—2016[R].蒙特利尔:国际民航组织,2013年.
[3] 国际电联. 实时监测包括黑匣子在内的飞行数据专家对话——云计算和大数据时代对国际标准的需求[EB/OL]. [2016-08-15]., 2014-7-30.
[4] International Civil Aviation Organization. Second high-level safety conference 2015(HLSC 2015)planning for global aviation safety improvement[EB/OL].[2016-07-14].
[5] International Civil Aviation Organization. Global aeronautical distress & safety system(gadss)concept of operations made by the adhoc working group on aircraft tracking[EB/OL].[2016-08-05].
[6] 吴志军,王慧. 信息安全中Safety 与Security 的比较研究[J].信息网络安全,2013(8):84-86. WU Zhijun, WANG Hui. The difference between Security and Safety[J]. Netinfo Security, 2013(8):84-86.
[7] 吴志军,胡涛涛. 空中交通管理信息安全研究[J]. 信息安全研究, 2015, 1(2):155-162. WU Zhijun, HU Taotao. Brief introduction to information security in air traffic management[J].Journal of Information Security Reserach, 2015, 1(2):155-162.
[8] ICAO. Global tracking initiatives [EB/OL]. [2016-07-29].
[9] 吴志军,赵婷,雷缙. 广域信息管理SWIM信息安全技术标准研究[J]. 信息网络安全, 2014(1):1-4. WU Zhijun, ZHAO Ting, LEI Jin. Research on SWIM security technology standards[J]. Netinfo Security, 2014(1):1-4.
[1] DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110.
[2] KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23.
[3] DENG Song. Web data source selection for humanities information integration of tourism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 70-76.
[4] ZHANG Jing, XUE Leng, CUI Yi, RONG Hui, WANG Jian-ping. Modeling and evaluation of a dual chaotic encryption algorithm for WSN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(03): 1-5.
[5] KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming. A method of personalized privacy preservation based on K-anonymization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 142-149.
[6] HUANG Jing-wen. uzzy group decision making for information security risk factors analysis [J]. J4, 2012, 47(11): 45-49.
Full text



No Suggested Reading articles found!