Lightweight Location Verification in Air Traffic Surveillance Networks

@article{Strohmeier2015LightweightLV,
  title={Lightweight Location Verification in Air Traffic Surveillance Networks},
  author={Martin Strohmeier and Vincent Lenders and Ivan Martinovic},
  journal={Proceedings of the 1st ACM Workshop on Cyber-Physical System Security},
  year={2015}
}
In this work, we develop a realistic threat model for attacks on modern air traffic communication networks and show that current state-of-the-art countermeasures such as multilateration are insufficient. We propose two alternatives, a statistical location verification technique and a grid-based location estimation approach, to deal with the identified threats. We evaluate our proposals using real-world flight data and quantify their effectiveness in terms of aircraft location accuracy… 

A Localization Approach for Crowdsourced Air Traffic Communication Networks

In this work, we argue that current state-of-the-art methods of aircraft localization such as multilateration are insufficient, in particular for modern crowdsourced air traffic networks with random,

A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks

In this paper, we argue that current state-of-the-art methods of aircraft localization such as multilateration are insufficient, in particular for modern crowdsourced air traffic networks with

Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems

This work discusses data integrity threats to balise transmission modules and uses high-fidelity simulation to study the risks posed by data integrity attacks and proposes a practical two-layer solution to mitigate the impact under various attacks.

Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance

A non-invasive trust evaluation system to detect attacks on ADS-B-based air-traffic surveillance using real-world flight data as collected by an infrastructure of ground-based sensors and Machine Learning-aided classification of reception patterns.

Detection and localization of attacks on satellite-based navigation systems

This work develops effective mechanisms for the detection of GPS spoofing attacks and proposes Crowd-GPS-Sec as a system for pinpointing an attacker via Automatic Dependent SurveillanceBroadcast (ADS-B) aircraft messages.

Security in next generation air traffic communication networks

A comprehensive new threat model is developed and countermeasures are proposed that are able to defend against the injection of false data into air traffic control systems and can significantly and immediately improve the security of air traffic communication networks under the existing real-world constraints.

Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems

This paper proposes the formal model of multidevice false data injection attacks in the ATC system against the location verification and discusses the real-world constraints that limit their effectiveness and the countermeasures of these attacks.

MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors

A message verification protocol called MAVPro is designed to evaluate the trustworthiness of received ADS-B messages whose authenticity and integrity could otherwise not be verified and is able to considerably extend the coverage area where security checks can be applied compared to existing solutions.

An ADS-B Intrusion Detection System

This paper proposes an intrusion detection system (IDS) specifically designed to detect malicious or questionable ADS-B messages and leverages prior work on cyber-defense mechanisms against ADS-Bs attacks and physical aspects of aircraft motion to classify received ADS- B traffic as potential attacks and retain digital artifacts that might support post-attack forensic investigations.

On Perception and Reality in Wireless Air Traffic Communication Security

This survey aims to reconcile the view of the security community and the perspective of aviation professionals concerning the safety of air traffic communication technologies and comprehensively analyze vulnerabilities and existing attacks.

References

SHOWING 1-10 OF 53 REFERENCES

Experimental Analysis of Attacks on Next Generation Air Traffic Communication

The objective is to shed light on the practicability of different threats and to quantify the main factors that impact the success of such attacks, leading to the conclusion that any safety-critical air traffic decision process should not rely exclusively on the ADS-B system.

Enhancing the security of aircraft surveillance in the next generation air traffic control system

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

This survey seeks to go beyond the current state of the art and gives a detailed assessment of security measures that have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.

Realities and challenges of nextgen air traffic management: the case of ADS-B

The 1090 MHz communication channel is analyzed to understand the current state and its behavior under the increasing traffic load, and important security challenges faced by ADS-B are considered.

Can Cryptography Secure Next Generation Air Traffic Surveillance?

The proposed next-generation air traffic control system depends crucially on a surveillance technology called ADS-B. By 2020, nearly all aircraft flying through U.S. airspace must carry ADS-B

Identification of ADS-B System Vulnerabilities and Threats

This paper aims at addressing some of the uncertainties in ADS-B by assessing the vulnerabilities and threats in the transmission and computation information path through examination of the system critical elements and developing technical solutions for the problems.

Security analysis of the ADS-B implementation in the next generation air transportation system

Security of ADS-B: State of the Art and Beyond

This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security, and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.

Integrated aviation security for defense-in-depth of next generation air transportation system

  • W. LiP. Kamal
  • Computer Science
    2011 IEEE International Conference on Technologies for Homeland Security (HST)
  • 2011
This paper proposes an Integrated Aviation Security (IAS) framework for defense-in-depth of various aspects of NextGen security such as cyber security and aircraft anti-hijacking and presents a detailed implementation approach of IAS including the AlertEnterprise based Integrated Risk Management (IRM) Model.

Short paper: detection of GPS spoofing attacks in power grids

This paper analyzes the resilience of phasor measurement sensors, which record voltages and currents, to GPS spoofing performed by an adversary external to the system and proposes a solution that leverages the characteristics of multiple sensors in the power grid to limit the feasibility of such attacks.
...