Simulating ADS-B Attacks in Air Traffic Management

被引:3
|
作者
Blaberg, Anton [1 ]
Lindahl, Gustav [1 ]
Gurtov, Andrei [1 ]
Josefsson, Billy [2 ]
机构
[1] Linkoping Univ, Dept Comp & Informat Sci, Linkoping, Sweden
[2] Luftfartsverket, Norrkoping, Sweden
来源
2020 AIAA/IEEE 39TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) PROCEEDINGS | 2020年
关键词
ADS-B; Security; Aviation; Cyberattack; open-Scope; Simulation;
D O I
10.1109/dasc50938.2020.9256438
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
In Air Traffic Management (ATM) training, simulations of real air traffic control (ATC) scenarios are a key part of practical teaching. On the internet one may find multiple different ATM simulators available to the public with open source code. Today most aircraft transmit data about position, altitude, and speed into the atmosphere that practically are unencrypted data points. This data is called automatic dependant surveillance broadcast (ADS-B) data. The lack of security means that potential attackers could project "fake" ADS-B data and spoof existing data to air traffic controllers (ATCO) if the right equipment is used. We see this as a security flaw and we want to prepare ATCO for cyberattacks by modifying an ATM simulator with cyberattacks. First, OpenScope was chosen as the ATM simulator to be modified. Subsequently, three types of attacks were chosen for the simulator to be equipped with, based on ADS-B weaknesses from existing literature: aircraft not responding to commands, aircraft with altering positional data, and aircraft with incorrect speed and altitude data. The recorded parameters were the written command lines and corresponding aircraft type it was applied to. Using this modified simulator, ATCO can now be evaluated against cyberattacks.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] DEMONSTRATING ADS-B AND CPDLC ATTACKS WITH SOFTWARE-DEFINED RADIO
    Eskilsson, Sofie
    Gustafsson, Hanna
    Khan, Suleman
    Gurtov, Andrei
    2020 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2020,
  • [32] TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data
    Luo, Peng
    Wang, Buhong
    Tian, Jiwei
    COMPUTERS & SECURITY, 2024, 141
  • [33] Data Fusion Techniques Applied to Scenarios Including ADS-B and Radar Sensors for Air Traffic Control
    da Silva, Julio L. R.
    Brancalion, Jose F. B.
    Fernandes, David
    FUSION: 2009 12TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2009, : 1481 - +
  • [34] Studies of air traffic forecasts, airspace load and the effect of ADS-B via satellites on flight times
    Zhong, Z. W.
    Salleh, Saiful Ridhwan
    Chow, W. X.
    Ong, Z. M.
    ADVANCED FREE-SPACE OPTICAL COMMUNICATION TECHNIQUES AND APPLICATIONS II, 2016, 9991
  • [35] The Application of ADS-B Technology in Aviation Management in China
    Chen Wenhui
    Chen Quanshan
    Wang Yu
    Chen Huan
    He Yu
    Ling Ze
    2019 INTERNATIONAL CONFERENCE ON ARTS, MANAGEMENT, EDUCATION AND INNOVATION (ICAMEI 2019), 2019, : 212 - 217
  • [36] 浅谈ADS-B
    乔磊
    中国外资, 2012, (14) : 280 - 281
  • [37] Need for ADS-B
    Terry, D
    AVIATION WEEK & SPACE TECHNOLOGY, 2000, 152 (08): : 8 - 8
  • [38] MANAGEMENT OF HOLDING PATTERNS: A POTENTIAL ADS-B APPLICATION
    Smith, Arthur P.
    Bateman, Hilton
    DASC: 2008 IEEE/AIAA 27TH DIGITAL AVIONICS SYSTEMS CONFERENCE, VOLS 1 AND 2, 2008, : 652 - 663
  • [39] ADS-B, Friend or Foe: ADS-B Message Authentication for NextGen Aircraft
    Cook, Emily
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1256 - 1261
  • [40] A Machine Learning Approach for the Detection of Injection Attacks on ADS-B Messaging Systems
    Price, Joshua
    Slimane, Hadjar Ould
    Al Shamaileh, Khair
    Devabhaktuni, Vijay
    Kaabouch, Naima
    2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2023, : 293 - 297