Security requirements and guidelines for telecommunications in an urban air mobility (UAM) environment |
 |
Recommendation ITU-T X.1385 provides security threats, security requirements, and implementation guidelines for telecommunications in an urban air mobility (UAM) environment. UAM or advanced air mobility (AAM) is an air transportation system for on-demand passenger transport or cargo-carrying services, typically flown within or to/from urban areas. This new type of transportation system is expected to resolve various problems including the utmost traffic jams, environmental pollution and a dense population in a big city. To provide air mobility service with safe and exact aviation in an urban area, various communication systems should be used. Thus, those communication systems make it highly probable that some communication channels can be targets of an attacker to access connected aerial vehicle's internal systems and might cause heavy casualties.
This Recommendation may be utilized by UAM/AAM manufacturers and related industries for commercial implementation as telecommunication security requirements and guidelines only after approval by national and/or international aviation authorities.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/16163 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1370-X.1399: Intelligent transportation system (ITS) security |
Approval date: |
2025-04-17 |
Provisional name: | X.evtol-sec |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
[9 related work items in progress]
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1385 (04/2025)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|