This page is being moved to a new, faster, and mobile-friendly application! Access the enhanced and centralized experience now on MyWorkspace!
ITU ITU's 160 anniversary

Connecting the world and beyond

GSR 2025

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Study Groups tree view Expand Study Groups tree view
Scroll up
Scroll down

ITU-T X.1385 (04/2025)

عربي | 中文 | English | Español | Français | Русский
Security requirements and guidelines for telecommunications in an urban air mobility (UAM) environment
Recommendation ITU-T X.1385 provides security threats, security requirements, and implementation guidelines for telecommunications in an urban air mobility (UAM) environment. UAM or advanced air mobility (AAM) is an air transportation system for on-demand passenger transport or cargo-carrying services, typically flown within or to/from urban areas. This new type of transportation system is expected to resolve various problems including the utmost traffic jams, environmental pollution and a dense population in a big city. To provide air mobility service with safe and exact aviation in an urban area, various communication systems should be used. Thus, those communication systems make it highly probable that some communication channels can be targets of an attacker to access connected aerial vehicle's internal systems and might cause heavy casualties.
This Recommendation may be utilized by UAM/AAM manufacturers and related industries for commercial implementation as telecommunication security requirements and guidelines only after approval by national and/or international aviation authorities.
Citation: https://handle.itu.int/11.1002/1000/16163
Series title: X series: Data networks, open system communications and security
X.1300-X.1499: Secure applications and services (II)
X.1370-X.1399: Intelligent transportation system (ITS) security
Approval date: 2025年04月17日
Provisional name: X.evtol-sec
Approval process: TAP
Status: In force
Maintenance responsibility: ITU-T Study Group 17
Ed. ITU-T Recommendation Status Summary Table of Contents Download
1 X.1385 (04/2025) In force
here
here
here
Title Approved on Download
Guidelines for identity-based cryptosystems used for cross-domain secure communications 2023 here
Overview of hybrid approaches for key exchange with quantum key distribution 2022 here
Guidelines for security management of using artificial intelligence technology 2022 here
Successful use of security standards (2nd edition) 2020 here
Description of the incubation mechanism and ways to improve it 2020 here
Strategic approaches to the transformation of security studies 2020 here
[フレーム]

AltStyle によって変換されたページ (->オリジナル) /