An ADS-B Spoofing Attack Detection Method based on LASSO Ensemble Empirical Mode Decomposition

被引:0
|
作者
Shen, Zhiyuan [1 ]
Wang, Han [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Civil Aviat, Nanjing 210007, Jiangsu, Peoples R China
[2] Nanjing Univ Technol, Coll Energy, Nanjing 210007, Jiangsu, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the heart of modern air traffic control, automatic dependent surveillance-broadcast (ADS-B) features less aircraft separation required and lower cost when comparing with secondary surveillance radar(SSR). Different from advocacy response mode for SSR, ADS-B is constraint with its security since anyone with the off-the-shelf communication equipment can transmit their own false data. In this work, a novel method based on signal processing method was proposed to detect cyber attack which was widely concerned with the deadline for ADS-B implementation in most airspace approaching. The LASSO regression framework was proposed to break the constraint of uniform weight in the conventional ensemble empirical mode decomposition(EEMD). Based on the proposed method, the ADS-B signal was then implemented to LASSO EEMD. The obtained IMFs were analyzed to determine the feature that distinguishes the real ADS-B with the artificial interference. A simulation system composing of ADS-B receiver and spoofing sources produced by vehicle ADS-B out was build. The results show that the proposed method was efficient by a series of artificially spoofing attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] ADS-B spoofing attack detection method based on LSTM
    Wang, Jing
    Zou, Yunkai
    Ding, Jianli
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [2] ADS-B spoofing attack detection method based on LSTM
    Jing Wang
    Yunkai Zou
    Jianli Ding
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [3] Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection
    Shang, Fute
    Wang, Buhong
    Li, Tengyao
    Tian, Jiwei
    Cao, Kunrui
    Guo, Rongxiao
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (10) : 1734 - 1737
  • [4] ADS-B Data Attack Detection Based on Generative Adversarial Networks
    Li, Tengyao
    Wang, Buhong
    Shang, Fute
    Tian, Jiwei
    Cao, Kunrui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 323 - 336
  • [5] A Resilient Recovery Method on ADS-B Attack Data
    Li Tengyao
    Wang Buhong
    Shang Fuse
    Tian Jiwei
    Cao Kunrui
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2365 - 2373
  • [6] A Resilient Recovery Method on ADS-B Attack Data
    Li T.
    Wang B.
    Shang F.
    Tian J.
    Cao K.
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (10): : 2365 - 2373
  • [7] Lasso Regression Based on Empirical Mode Decomposition
    Qin, Lei
    Ma, Shuangge
    Lin, Jung-Chen
    Shia, Ben-Chang
    [J]. COMMUNICATIONS IN STATISTICS-SIMULATION AND COMPUTATION, 2016, 45 (04) : 1281 - 1294
  • [8] Sequential collaborative detection strategy on ADS-B data attack
    Li, Tengyao
    Wang, Buhong
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 24 : 78 - 99
  • [9] QRS Complex Detection Based on Ensemble Empirical Mode Decomposition
    Henzel, Norbert
    [J]. INNOVATIONS IN BIOMEDICAL ENGINEERING, 2017, 526 : 286 - 293
  • [10] Dynamic temporal ADS-B data attack detection based on sHDP-HMM
    Li, Tengyao
    Wang, Buhong
    Shang, Fute
    Tian, Jiwei
    Cao, Kunrui
    [J]. COMPUTERS & SECURITY, 2020, 93 (93)